#! /bin/sh
# Generated from testsuite.at by GNU Autoconf 2.69.
#
# Copyright (C) 2009-2012 Free Software Foundation, Inc.
#
# This test suite is free software; the Free Software Foundation gives
# unlimited permission to copy, distribute and modify it.
## -------------------- ##
## M4sh Initialization. ##
## -------------------- ##

# Be more Bourne compatible
DUALCASE=1; export DUALCASE # for MKS sh
if test -n "${ZSH_VERSION+set}" && (emulate sh) >/dev/null 2>&1; then :
  emulate sh
  NULLCMD=:
  # Pre-4.2 versions of Zsh do word splitting on ${1+"$@"}, which
  # is contrary to our usage.  Disable this feature.
  alias -g '${1+"$@"}'='"$@"'
  setopt NO_GLOB_SUBST
else
  case `(set -o) 2>/dev/null` in #(
  *posix*) :
    set -o posix ;; #(
  *) :
     ;;
esac
fi


as_nl='
'
export as_nl
# Printing a long string crashes Solaris 7 /usr/bin/printf.
as_echo='\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'
as_echo=$as_echo$as_echo$as_echo$as_echo$as_echo
as_echo=$as_echo$as_echo$as_echo$as_echo$as_echo$as_echo
# Prefer a ksh shell builtin over an external printf program on Solaris,
# but without wasting forks for bash or zsh.
if test -z "$BASH_VERSION$ZSH_VERSION" \
    && (test "X`print -r -- $as_echo`" = "X$as_echo") 2>/dev/null; then
  as_echo='print -r --'
  as_echo_n='print -rn --'
elif (test "X`printf %s $as_echo`" = "X$as_echo") 2>/dev/null; then
  as_echo='printf %s\n'
  as_echo_n='printf %s'
else
  if test "X`(/usr/ucb/echo -n -n $as_echo) 2>/dev/null`" = "X-n $as_echo"; then
    as_echo_body='eval /usr/ucb/echo -n "$1$as_nl"'
    as_echo_n='/usr/ucb/echo -n'
  else
    as_echo_body='eval expr "X$1" : "X\\(.*\\)"'
    as_echo_n_body='eval
      arg=$1;
      case $arg in #(
      *"$as_nl"*)
	expr "X$arg" : "X\\(.*\\)$as_nl";
	arg=`expr "X$arg" : ".*$as_nl\\(.*\\)"`;;
      esac;
      expr "X$arg" : "X\\(.*\\)" | tr -d "$as_nl"
    '
    export as_echo_n_body
    as_echo_n='sh -c $as_echo_n_body as_echo'
  fi
  export as_echo_body
  as_echo='sh -c $as_echo_body as_echo'
fi

# The user is always right.
if test "${PATH_SEPARATOR+set}" != set; then
  PATH_SEPARATOR=:
  (PATH='/bin;/bin'; FPATH=$PATH; sh -c :) >/dev/null 2>&1 && {
    (PATH='/bin:/bin'; FPATH=$PATH; sh -c :) >/dev/null 2>&1 ||
      PATH_SEPARATOR=';'
  }
fi


# IFS
# We need space, tab and new line, in precisely that order.  Quoting is
# there to prevent editors from complaining about space-tab.
# (If _AS_PATH_WALK were called with IFS unset, it would disable word
# splitting by setting IFS to empty value.)
IFS=" ""	$as_nl"

# Find who we are.  Look in the path if we contain no directory separator.
as_myself=
case $0 in #((
  *[\\/]* ) as_myself=$0 ;;
  *) as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    test -r "$as_dir/$0" && as_myself=$as_dir/$0 && break
  done
IFS=$as_save_IFS

     ;;
esac
# We did not find ourselves, most probably we were run as `sh COMMAND'
# in which case we are not to be found in the path.
if test "x$as_myself" = x; then
  as_myself=$0
fi
if test ! -f "$as_myself"; then
  $as_echo "$as_myself: error: cannot find myself; rerun with an absolute file name" >&2
  exit 1
fi

# Unset variables that we do not need and which cause bugs (e.g. in
# pre-3.0 UWIN ksh).  But do not cause bugs in bash 2.01; the "|| exit 1"
# suppresses any "Segmentation fault" message there.  '((' could
# trigger a bug in pdksh 5.2.14.
for as_var in BASH_ENV ENV MAIL MAILPATH
do eval test x\${$as_var+set} = xset \
  && ( (unset $as_var) || exit 1) >/dev/null 2>&1 && unset $as_var || :
done
PS1='$ '
PS2='> '
PS4='+ '

# NLS nuisances.
LC_ALL=C
export LC_ALL
LANGUAGE=C
export LANGUAGE

# CDPATH.
(unset CDPATH) >/dev/null 2>&1 && unset CDPATH

if test "x$CONFIG_SHELL" = x; then
  as_bourne_compatible="if test -n \"\${ZSH_VERSION+set}\" && (emulate sh) >/dev/null 2>&1; then :
  emulate sh
  NULLCMD=:
  # Pre-4.2 versions of Zsh do word splitting on \${1+\"\$@\"}, which
  # is contrary to our usage.  Disable this feature.
  alias -g '\${1+\"\$@\"}'='\"\$@\"'
  setopt NO_GLOB_SUBST
else
  case \`(set -o) 2>/dev/null\` in #(
  *posix*) :
    set -o posix ;; #(
  *) :
     ;;
esac
fi
"
  as_required="as_fn_return () { (exit \$1); }
as_fn_success () { as_fn_return 0; }
as_fn_failure () { as_fn_return 1; }
as_fn_ret_success () { return 0; }
as_fn_ret_failure () { return 1; }

exitcode=0
as_fn_success || { exitcode=1; echo as_fn_success failed.; }
as_fn_failure && { exitcode=1; echo as_fn_failure succeeded.; }
as_fn_ret_success || { exitcode=1; echo as_fn_ret_success failed.; }
as_fn_ret_failure && { exitcode=1; echo as_fn_ret_failure succeeded.; }
if ( set x; as_fn_ret_success y && test x = \"\$1\" ); then :

else
  exitcode=1; echo positional parameters were not saved.
fi
test x\$exitcode = x0 || exit 1
test -x / || exit 1"
  as_suggested="  as_lineno_1=";as_suggested=$as_suggested$LINENO;as_suggested=$as_suggested" as_lineno_1a=\$LINENO
  as_lineno_2=";as_suggested=$as_suggested$LINENO;as_suggested=$as_suggested" as_lineno_2a=\$LINENO
  eval 'test \"x\$as_lineno_1'\$as_run'\" != \"x\$as_lineno_2'\$as_run'\" &&
  test \"x\`expr \$as_lineno_1'\$as_run' + 1\`\" = \"x\$as_lineno_2'\$as_run'\"' || exit 1
test \$(( 1 + 1 )) = 2 || exit 1"
  if (eval "$as_required") 2>/dev/null; then :
  as_have_required=yes
else
  as_have_required=no
fi
  if test x$as_have_required = xyes && (eval "$as_suggested") 2>/dev/null; then :

else
  as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
as_found=false
for as_dir in /bin$PATH_SEPARATOR/usr/bin$PATH_SEPARATOR$PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
  as_found=:
  case $as_dir in #(
	 /*)
	   for as_base in sh bash ksh sh5; do
	     # Try only shells that exist, to save several forks.
	     as_shell=$as_dir/$as_base
	     if { test -f "$as_shell" || test -f "$as_shell.exe"; } &&
		    { $as_echo "$as_bourne_compatible""$as_required" | as_run=a "$as_shell"; } 2>/dev/null; then :
  CONFIG_SHELL=$as_shell as_have_required=yes
		   if { $as_echo "$as_bourne_compatible""$as_suggested" | as_run=a "$as_shell"; } 2>/dev/null; then :
  break 2
fi
fi
	   done;;
       esac
  as_found=false
done
$as_found || { if { test -f "$SHELL" || test -f "$SHELL.exe"; } &&
	      { $as_echo "$as_bourne_compatible""$as_required" | as_run=a "$SHELL"; } 2>/dev/null; then :
  CONFIG_SHELL=$SHELL as_have_required=yes
fi; }
IFS=$as_save_IFS


      if test "x$CONFIG_SHELL" != x; then :
  export CONFIG_SHELL
             # We cannot yet assume a decent shell, so we have to provide a
# neutralization value for shells without unset; and this also
# works around shells that cannot unset nonexistent variables.
# Preserve -v and -x to the replacement shell.
BASH_ENV=/dev/null
ENV=/dev/null
(unset BASH_ENV) >/dev/null 2>&1 && unset BASH_ENV ENV
case $- in # ((((
  *v*x* | *x*v* ) as_opts=-vx ;;
  *v* ) as_opts=-v ;;
  *x* ) as_opts=-x ;;
  * ) as_opts= ;;
esac
exec $CONFIG_SHELL $as_opts "$as_myself" ${1+"$@"}
# Admittedly, this is quite paranoid, since all the known shells bail
# out after a failed `exec'.
$as_echo "$0: could not re-execute with $CONFIG_SHELL" >&2
exit 255
fi

    if test x$as_have_required = xno; then :
  $as_echo "$0: This script requires a shell more modern than all"
  $as_echo "$0: the shells that I found on your system."
  if test x${ZSH_VERSION+set} = xset ; then
    $as_echo "$0: In particular, zsh $ZSH_VERSION has bugs and should"
    $as_echo "$0: be upgraded to zsh 4.3.4 or later."
  else
    $as_echo "$0: Please tell bug-autoconf@gnu.org about your system,
$0: including any error possibly output before this
$0: message. Then install a modern shell, or manually run
$0: the script under such a shell if you do have one."
  fi
  exit 1
fi
fi
fi
SHELL=${CONFIG_SHELL-/bin/sh}
export SHELL
# Unset more variables known to interfere with behavior of common tools.
CLICOLOR_FORCE= GREP_OPTIONS=
unset CLICOLOR_FORCE GREP_OPTIONS

## --------------------- ##
## M4sh Shell Functions. ##
## --------------------- ##
# as_fn_unset VAR
# ---------------
# Portably unset VAR.
as_fn_unset ()
{
  { eval $1=; unset $1;}
}
as_unset=as_fn_unset

# as_fn_set_status STATUS
# -----------------------
# Set $? to STATUS, without forking.
as_fn_set_status ()
{
  return $1
} # as_fn_set_status

# as_fn_exit STATUS
# -----------------
# Exit the shell with STATUS, even in a "trap 0" or "set -e" context.
as_fn_exit ()
{
  set +e
  as_fn_set_status $1
  exit $1
} # as_fn_exit

# as_fn_mkdir_p
# -------------
# Create "$as_dir" as a directory, including parents if necessary.
as_fn_mkdir_p ()
{

  case $as_dir in #(
  -*) as_dir=./$as_dir;;
  esac
  test -d "$as_dir" || eval $as_mkdir_p || {
    as_dirs=
    while :; do
      case $as_dir in #(
      *\'*) as_qdir=`$as_echo "$as_dir" | sed "s/'/'\\\\\\\\''/g"`;; #'(
      *) as_qdir=$as_dir;;
      esac
      as_dirs="'$as_qdir' $as_dirs"
      as_dir=`$as_dirname -- "$as_dir" ||
$as_expr X"$as_dir" : 'X\(.*[^/]\)//*[^/][^/]*/*$' \| \
	 X"$as_dir" : 'X\(//\)[^/]' \| \
	 X"$as_dir" : 'X\(//\)$' \| \
	 X"$as_dir" : 'X\(/\)' \| . 2>/dev/null ||
$as_echo X"$as_dir" |
    sed '/^X\(.*[^/]\)\/\/*[^/][^/]*\/*$/{
	    s//\1/
	    q
	  }
	  /^X\(\/\/\)[^/].*/{
	    s//\1/
	    q
	  }
	  /^X\(\/\/\)$/{
	    s//\1/
	    q
	  }
	  /^X\(\/\).*/{
	    s//\1/
	    q
	  }
	  s/.*/./; q'`
      test -d "$as_dir" && break
    done
    test -z "$as_dirs" || eval "mkdir $as_dirs"
  } || test -d "$as_dir" || as_fn_error $? "cannot create directory $as_dir"


} # as_fn_mkdir_p

# as_fn_executable_p FILE
# -----------------------
# Test if FILE is an executable regular file.
as_fn_executable_p ()
{
  test -f "$1" && test -x "$1"
} # as_fn_executable_p
# as_fn_append VAR VALUE
# ----------------------
# Append the text in VALUE to the end of the definition contained in VAR. Take
# advantage of any shell optimizations that allow amortized linear growth over
# repeated appends, instead of the typical quadratic growth present in naive
# implementations.
if (eval "as_var=1; as_var+=2; test x\$as_var = x12") 2>/dev/null; then :
  eval 'as_fn_append ()
  {
    eval $1+=\$2
  }'
else
  as_fn_append ()
  {
    eval $1=\$$1\$2
  }
fi # as_fn_append

# as_fn_arith ARG...
# ------------------
# Perform arithmetic evaluation on the ARGs, and store the result in the
# global $as_val. Take advantage of shells that can avoid forks. The arguments
# must be portable across $(()) and expr.
if (eval "test \$(( 1 + 1 )) = 2") 2>/dev/null; then :
  eval 'as_fn_arith ()
  {
    as_val=$(( $* ))
  }'
else
  as_fn_arith ()
  {
    as_val=`expr "$@" || test $? -eq 1`
  }
fi # as_fn_arith


# as_fn_error STATUS ERROR [LINENO LOG_FD]
# ----------------------------------------
# Output "`basename $0`: error: ERROR" to stderr. If LINENO and LOG_FD are
# provided, also output the error to LOG_FD, referencing LINENO. Then exit the
# script with STATUS, using 1 if that was 0.
as_fn_error ()
{
  as_status=$1; test $as_status -eq 0 && as_status=1
  if test "$4"; then
    as_lineno=${as_lineno-"$3"} as_lineno_stack=as_lineno_stack=$as_lineno_stack
    $as_echo "$as_me:${as_lineno-$LINENO}: error: $2" >&$4
  fi
  $as_echo "$as_me: error: $2" >&2
  as_fn_exit $as_status
} # as_fn_error

if expr a : '\(a\)' >/dev/null 2>&1 &&
   test "X`expr 00001 : '.*\(...\)'`" = X001; then
  as_expr=expr
else
  as_expr=false
fi

if (basename -- /) >/dev/null 2>&1 && test "X`basename -- / 2>&1`" = "X/"; then
  as_basename=basename
else
  as_basename=false
fi

as_me=`$as_basename -- "$0" ||
$as_expr X/"$0" : '.*/\([^/][^/]*\)/*$' \| \
	 X"$0" : 'X\(//\)$' \| \
	 X"$0" : 'X\(/\)' \| . 2>/dev/null ||
$as_echo X/"$0" |
    sed '/^.*\/\([^/][^/]*\)\/*$/{
	    s//\1/
	    q
	  }
	  /^X\/\(\/\/\)$/{
	    s//\1/
	    q
	  }
	  /^X\/\(\/\).*/{
	    s//\1/
	    q
	  }
	  s/.*/./; q'`

if (as_dir=`dirname -- /` && test "X$as_dir" = X/) >/dev/null 2>&1; then
  as_dirname=dirname
else
  as_dirname=false
fi

# Avoid depending upon Character Ranges.
as_cr_letters='abcdefghijklmnopqrstuvwxyz'
as_cr_LETTERS='ABCDEFGHIJKLMNOPQRSTUVWXYZ'
as_cr_Letters=$as_cr_letters$as_cr_LETTERS
as_cr_digits='0123456789'
as_cr_alnum=$as_cr_Letters$as_cr_digits


  as_lineno_1=$LINENO as_lineno_1a=$LINENO
  as_lineno_2=$LINENO as_lineno_2a=$LINENO
  eval 'test "x$as_lineno_1'$as_run'" != "x$as_lineno_2'$as_run'" &&
  test "x`expr $as_lineno_1'$as_run' + 1`" = "x$as_lineno_2'$as_run'"' || {
  # Blame Lee E. McMahon (1931-1989) for sed's syntax.  :-)
  sed -n '
    p
    /[$]LINENO/=
  ' <$as_myself |
    sed '
      s/[$]LINENO.*/&-/
      t lineno
      b
      :lineno
      N
      :loop
      s/[$]LINENO\([^'$as_cr_alnum'_].*\n\)\(.*\)/\2\1\2/
      t loop
      s/-\n.*//
    ' >$as_me.lineno &&
  chmod +x "$as_me.lineno" ||
    { $as_echo "$as_me: error: cannot create $as_me.lineno; rerun with a POSIX shell" >&2; as_fn_exit 1; }

  # If we had to re-execute with $CONFIG_SHELL, we're ensured to have
  # already done that, so ensure we don't try to do so again and fall
  # in an infinite loop.  This has already happened in practice.
  _as_can_reexec=no; export _as_can_reexec
  # Don't try to exec as it changes $[0], causing all sort of problems
  # (the dirname of $[0] is not the place where we might find the
  # original and so on.  Autoconf is especially sensitive to this).
  . "./$as_me.lineno"
  # Exit status is that of the last command.
  exit
}

ECHO_C= ECHO_N= ECHO_T=
case `echo -n x` in #(((((
-n*)
  case `echo 'xy\c'` in
  *c*) ECHO_T='	';;	# ECHO_T is single tab character.
  xy)  ECHO_C='\c';;
  *)   echo `echo ksh88 bug on AIX 6.1` > /dev/null
       ECHO_T='	';;
  esac;;
*)
  ECHO_N='-n';;
esac

rm -f conf$$ conf$$.exe conf$$.file
if test -d conf$$.dir; then
  rm -f conf$$.dir/conf$$.file
else
  rm -f conf$$.dir
  mkdir conf$$.dir 2>/dev/null
fi
if (echo >conf$$.file) 2>/dev/null; then
  if ln -s conf$$.file conf$$ 2>/dev/null; then
    as_ln_s='ln -s'
    # ... but there are two gotchas:
    # 1) On MSYS, both `ln -s file dir' and `ln file dir' fail.
    # 2) DJGPP < 2.04 has no symlinks; `ln -s' creates a wrapper executable.
    # In both cases, we have to default to `cp -pR'.
    ln -s conf$$.file conf$$.dir 2>/dev/null && test ! -f conf$$.exe ||
      as_ln_s='cp -pR'
  elif ln conf$$.file conf$$ 2>/dev/null; then
    as_ln_s=ln
  else
    as_ln_s='cp -pR'
  fi
else
  as_ln_s='cp -pR'
fi
rm -f conf$$ conf$$.exe conf$$.dir/conf$$.file conf$$.file
rmdir conf$$.dir 2>/dev/null

if mkdir -p . 2>/dev/null; then
  as_mkdir_p='mkdir -p "$as_dir"'
else
  test -d ./-p && rmdir ./-p
  as_mkdir_p=false
fi

as_test_x='test -x'
as_executable_p=as_fn_executable_p

# Sed expression to map a string onto a valid CPP name.
as_tr_cpp="eval sed 'y%*$as_cr_letters%P$as_cr_LETTERS%;s%[^_$as_cr_alnum]%_%g'"

# Sed expression to map a string onto a valid variable name.
as_tr_sh="eval sed 'y%*+%pp%;s%[^_$as_cr_alnum]%_%g'"





SHELL=${CONFIG_SHELL-/bin/sh}

# How were we run?
at_cli_args="$@"


# Not all shells have the 'times' builtin; the subshell is needed to make
# sure we discard the 'times: not found' message from the shell.
at_times_p=false
(times) >/dev/null 2>&1 && at_times_p=:

# CLI Arguments to pass to the debugging scripts.
at_debug_args=
# -e sets to true
at_errexit_p=false
# Shall we be verbose?  ':' means no, empty means yes.
at_verbose=:
at_quiet=
# Running several jobs in parallel, 0 means as many as test groups.
at_jobs=1
at_traceon=:
at_trace_echo=:
at_check_filter_trace=:

# Shall we keep the debug scripts?  Must be `:' when the suite is
# run by a debug script, so that the script doesn't remove itself.
at_debug_p=false
# Display help message?
at_help_p=false
# Display the version message?
at_version_p=false
# List test groups?
at_list_p=false
# --clean
at_clean=false
# Test groups to run
at_groups=
# Whether to rerun failed tests.
at_recheck=
# Whether a write failure occurred
at_write_fail=0

# The directory we run the suite in.  Default to . if no -C option.
at_dir=`pwd`
# An absolute reference to this testsuite script.
case $as_myself in
  [\\/]* | ?:[\\/]* ) at_myself=$as_myself ;;
  * ) at_myself=$at_dir/$as_myself ;;
esac
# Whether -C is in effect.
at_change_dir=false

# Whether to enable colored test results.
at_color=auto
# List of the tested programs.
at_tested=''
# As many question marks as there are digits in the last test group number.
# Used to normalize the test group numbers so that `ls' lists them in
# numerical order.
at_format='???'
# Description of all the test groups.
at_help_all="1;firewall-cmd.at:5;basic options;offline panic reload gh808;
2;firewall-cmd.at:34;get/list options;offline zone service icmp;
3;firewall-cmd.at:50;default zone;offline zone;
4;firewall-cmd.at:62;user zone;offline zone;
5;firewall-cmd.at:82;zone interfaces;offline zone;
6;firewall-cmd.at:170;zone sources;offline zone;
7;firewall-cmd.at:223;services;offline service;
8;firewall-cmd.at:267;user services;offline service;
9;firewall-cmd.at:349;ports;offline port;
10;firewall-cmd.at:406;source ports;offline port;
11;firewall-cmd.at:443;protocols;offline protocol;
12;firewall-cmd.at:471;masquerade;offline masquerade nat;
13;firewall-cmd.at:498;forward;offline forward gh586 gh613;
14;firewall-cmd.at:686;forward ports;offline port forward_port;
15;firewall-cmd.at:785;ICMP block;offline icmp;
16;firewall-cmd.at:831;user ICMP types;offline icmp;
17;firewall-cmd.at:854;ipset;offline ipset rhbz1685256;
18;firewall-cmd.at:1063;user helpers;offline helper;
19;firewall-cmd.at:1091;direct;offline direct;
20;firewall-cmd.at:1165;direct nat;offline direct nat;
21;firewall-cmd.at:1190;direct passthrough;offline direct passthrough;
22;firewall-cmd.at:1228;direct ebtables;offline direct ebtables;
23;firewall-cmd.at:1274;lockdown;offline lockdown;
24;firewall-cmd.at:1341;rich rules good;offline rich;
25;firewall-cmd.at:1375;rich rules audit;offline rich;
26;firewall-cmd.at:1383;rich rules priority;offline rich;
27;firewall-cmd.at:1938;rich rules bad;offline rich;
28;firewall-cmd.at:1981;config validation;offline check_config;
29;rfc3964_ipv4.at:1;RFC3964_IPv4;offline rfc3964_ipv4;
30;service_include.at:1;service include;offline service xml gh273 rhbz1720300 gh707 gh1075;
31;helpers_custom.at:1;customer helpers;offline helpers rhbz1733066 gh514 rhbz1769520;
32;policy.at:5;policy - xml;offline policy xml;
33;policy.at:79;policy - create;offline policy;
34;policy.at:96;policy - name;offline policy;
35;policy.at:109;policy - list;offline policy;
36;policy.at:231;policy - options;offline policy;
37;policy.at:286;policy - priority;offline policy;
38;policy.at:470;policy - zones;offline policy;
39;policy.at:822;policy - dispatch;offline policy;
40;policy.at:5351;policy - interfaces/sources;offline policy;
41;policy.at:6072;policy - target;offline policy;
42;policy.at:6121;policy - from file;offline policy;
43;policy.at:6138;policy - zone drifting not allowed;offline policy gh797;
44;services.at:1;services;offline policy service;
45;ports.at:1;ports;offline policy port;
46;source_ports.at:1;source ports;offline policy source_port;
47;forward_ports.at:1;forward ports;offline policy forward_port;
48;forward_ports.at:199;forward ports (OUTPUT);offline policy forward_port rhbz2039542;
49;masquerade.at:1;masquerade;offline policy masquerade gh926;
50;protocols.at:1;protocols;offline policy protocol;
51;rich_rules.at:1;rich rules;offline policy rich;
52;icmp_blocks.at:1;ICMP blocks;offline policy icmp_block;
53;rich_tcp_mss_clamp.at:5;tcp-mss-clamp;offline tcp-mss-clamp gh1121;
54;rich_destination_ipset.at:1;rich destination ipset;offline rich ipset;
55;zone.at:1;zone - target;offline zone;
56;rpfilter.at:1;rpfilter;offline rpfilter;
57;zone_combine.at:1;zone - combine;offline zone;
58;ipset_defer_native_ipset_creation.at:1;ipset defer native creation;offline ipset direct rhbz2122678;
59;reset_defaults.at:1;reset defaults;offline reset;
60;zone_priority.at:1;zone - priority;offline zone;
61;firewall-offline-cmd.at:19;lokkit migration;offline lokkit;
62;firewalld.conf.at:1;firewalld.conf;nftables dbus;
63;service.at:1;dbus api - services;nftables dbus service rhbz1721414 rhbz1737045 gh514;
64;zone_permanent_signatures.at:1;dbus api - zone permanent signatures;nftables dbus zone gh586 gh613;
65;zone_runtime_signatures.at:1;dbus api - zone runtime signatures;nftables dbus zone gh586 gh613;
66;zone_permanent_functional.at:1;dbus api - zone permanent functional;nftables dbus zone gh586 gh613;
67;zone_runtime_functional.at:1;dbus api - zone runtime functional;nftables dbus zone gh586 gh613;
68;policy_permanent_signatures.at:1;dbus api - policy permanent signatures;nftables dbus policy;
69;policy_runtime_signatures.at:1;dbus api - policy runtime signatures;nftables dbus policy;
70;policy_permanent_functional.at:1;dbus api - policy permanent functional;nftables dbus policy;
71;policy_runtime_functional.at:1;dbus api - policy runtime functional;nftables dbus policy;
72;direct.at:1;dbus api - direct signatures;nftables dbus direct;
73;firewall-cmd.at:5;basic options;nftables panic reload gh808;
74;firewall-cmd.at:34;get/list options;nftables zone service icmp;
75;firewall-cmd.at:50;default zone;nftables zone;
76;firewall-cmd.at:62;user zone;nftables zone;
77;firewall-cmd.at:82;zone interfaces;nftables zone;
78;firewall-cmd.at:170;zone sources;nftables zone;
79;firewall-cmd.at:223;services;nftables service;
80;firewall-cmd.at:267;user services;nftables service;
81;firewall-cmd.at:349;ports;nftables port;
82;firewall-cmd.at:406;source ports;nftables port;
83;firewall-cmd.at:443;protocols;nftables protocol;
84;firewall-cmd.at:471;masquerade;nftables masquerade nat;
85;firewall-cmd.at:498;forward;nftables forward gh586 gh613;
86;firewall-cmd.at:686;forward ports;nftables port forward_port;
87;firewall-cmd.at:785;ICMP block;nftables icmp;
88;firewall-cmd.at:831;user ICMP types;nftables icmp;
89;firewall-cmd.at:854;ipset;nftables ipset rhbz1685256;
90;firewall-cmd.at:1063;user helpers;nftables helper;
91;firewall-cmd.at:1091;direct;nftables direct;
92;firewall-cmd.at:1165;direct nat;nftables direct nat;
93;firewall-cmd.at:1190;direct passthrough;nftables direct passthrough;
94;firewall-cmd.at:1228;direct ebtables;nftables direct ebtables;
95;firewall-cmd.at:1274;lockdown;nftables lockdown;
96;firewall-cmd.at:1341;rich rules good;nftables rich;
97;firewall-cmd.at:1375;rich rules audit;nftables rich;
98;firewall-cmd.at:1383;rich rules priority;nftables rich;
99;firewall-cmd.at:1938;rich rules bad;nftables rich;
100;firewall-cmd.at:1981;config validation;nftables check_config;
101;rhbz1514043.at:1;--set-log-denied does not zero config;nftables log_denied rhbz1514043;
102;rhbz1498923.at:1;invalid direct rule causes reload error;nftables direct reload rhbz1498923;
103;pr181.at:1;combined zones name length check;nftables zone gh181;
104;gh287.at:1;ICMP block inversion;nftables icmp gh287;
105;individual_calls.at:1;individual calls;nftables individual_calls;
106;rhbz1534571.at:3;rule deduplication;nftables rhbz1534571;
107;gh290.at:1;invalid syntax in xml files;nftables xml direct gh290;
108;gh290.at:19;invalid syntax in xml files;nftables xml zone gh290;
109;icmp_block_in_forward_chain.at:1;ICMP block not present FORWARD chain;nftables icmp;
110;pr323.at:1;GRE proto helper;nftables helper gh323;
111;rhbz1506742.at:1;ipset with timeout;nftables ipset rhbz1506742 rhbz2055330 gh699 gh908;
112;rhbz1594657.at:1;no log untracked passthrough queries;nftables direct passthrough rhbz1594657;
113;rhbz1571957.at:1;set-log-denied w/ ICMP block inversion;nftables log_denied rhbz1571957 icmp;
114;rhbz1404076.at:1;query single port added with range;nftables port rhbz1404076;
115;gh366.at:1;service destination multiple IP versions;nftables service gh366;
116;rhbz1601610.at:1;ipset duplicate entries;nftables ipset rhbz1601610;
117;gh303.at:1;unicode in XML;nftables xml unicode service gh303;
118;gh335.at:1;forward-port toaddr enables IP forwarding;nftables port forward_port gh335;
119;gh482.at:1;remove forward-port after reload;nftables gh482 rhbz1637675 rich forward_port;
120;gh478.at:1;rich rule marks every packet;nftables rich mark gh478;
121;gh453.at:1;nftables helper objects;nftables helper gh453;
122;gh258.at:1;zone dispatch layout;nftables zone gh258 gh441 rhbz1713823;
123;rhbz1715977.at:1;rich rule src/dst with service destination;nftables rich service rhbz1715977 rhbz1729097 rhbz1791783;
124;rhbz1723610.at:1;direct remove-rules per family;nftables direct rhbz1723610 gh385;
125;rhbz1734765.at:1;zone sources ordered by name;nftables zone rhbz1734765 rhbz1421222 gh166 rhbz1738545;
126;gh509.at:1;missing firewalld.conf file;nftables gh509;
127;gh567.at:1;rich rule source w/ mark action;nftables gh567 rich ipset;
128;rhbz1779835.at:1;ipv6 address with brackets;nftables rhbz1779835 ipset;
129;rhbz1779835.at:16;ipv6 address with brackets;nftables rhbz1779835 zone forward_port rich;
130;gh330.at:1;ipset cleanup on reload/stop;nftables ipset reload gh330 rhbz1682913 rhbz1790948 rhbz1809225;
131;gh599.at:1;writing to log after copytruncate;nftables gh599;
132;rhbz1843398.at:1;rich rule source mac;nftables rich rhbz1843398 gh643;
133;rhbz1839781.at:1;service RH-Satellite-6;nftables service rhbz1839781;
134;rhbz1689429.at:1;rich rule invalid priority;nftables rich rhbz1689429;
135;rhbz1483921.at:1;direct and zone mutually exclusive;nftables direct rhbz1483921;
136;rhbz1541077.at:1;hash:mac and family mutually exclusive;nftables ipset rhbz1541077;
137;rhbz1855140.at:1;rich rule icmptypes with one family;nftables rich icmp rhbz1855140;
138;rhbz1871298.at:1;rich rule parsing bottleneck;nftables rich offline rhbz1871298;
139;rhbz1596304.at:1;rich rules strip non-printable characters;nftables rich rhbz1596304;
140;gh703.at:1;add source with mac address;nftables gh703;
141;ipset_netmask_allowed.at:1;ipset netmask allowed type hash:ip;nftables ipset reload;
142;rhbz1940928.at:1;direct -s/-d multiple addresses;nftables direct rhbz1940928 rhbz1949552;
143;rhbz1936896.at:1;ipset type hash:net,net;nftables rhbz1936896;
144;gh795.at:1;ipset entry delete w/ timeout=0;nftables ipset gh794 gh795;
145;rhbz1914935.at:1;zone overlapping ports;nftables zone port rhbz1914935;
146;gh696.at:1;icmp-block-inversion no log blocked;nftables icmp gh696 rhbz1945833;
147;rhbz1917766.at:1;rich rule source with netmask;nftables rich rhbz1917766;
148;rhbz2014383.at:1;same source in two zone xml;nftables zone rhbz2014383;
149;gh874.at:1;policy masquerade w/ ingress interface;nftables policy zone masquerade gh874 gh926;
150;gh881.at:1;ipset entry overlap detect perf;nftables ipset gh881;
151;service_includes_for_builtin.at:1;service include for built-in;nftables dbus service service_includes_for_builtin service_includes_for_built-in;
152;gh940.at:1;log prefix;nftables policy gh940;
153;build_policy_split_wildcard.at:1;build policy split wildcards;nftables gh892 policy;
154;gh1011.at:1;remove entries results in empty;nftables ipset gh1011 rhbz2121985;
155;rhbz2181406.at:1;rich rule limit;nftables rich rhbz2181406;
156;ipset_scale.at:1;ipset scale;nftables ipset gh738;
157;gh1129.at:1;switch backend to iptables and reload;nftables gh1129;
158;gh1146.at:1;policy with mixed family zone source;nftables policy gh1146;
159;gh1152.at:1;list-all identical content;nftables cli gh1152;
160;rhbz2222044.at:1;duplicate rules after restart;nftables rhbz2222044;
161;python.at:3;firewalld_test.py;nftables python;
162;python.at:8;firewalld_config.py;nftables python;
163;python.at:13;firewalld_rich.py;nftables python;
164;python.at:18;firewalld_direct.py;nftables python;
165;rfc3964_ipv4.at:1;RFC3964_IPv4;nftables rfc3964_ipv4;
166;service_include.at:1;service include;nftables service xml gh273 rhbz1720300 gh707 gh1075;
167;helpers_custom.at:1;customer helpers;nftables helpers rhbz1733066 gh514 rhbz1769520;
168;policy.at:5;policy - xml;nftables policy xml;
169;policy.at:79;policy - create;nftables policy;
170;policy.at:96;policy - name;nftables policy;
171;policy.at:109;policy - list;nftables policy;
172;policy.at:231;policy - options;nftables policy;
173;policy.at:286;policy - priority;nftables policy;
174;policy.at:470;policy - zones;nftables policy;
175;policy.at:822;policy - dispatch;nftables policy;
176;policy.at:5351;policy - interfaces/sources;nftables policy;
177;policy.at:6072;policy - target;nftables policy;
178;policy.at:6121;policy - from file;nftables policy;
179;policy.at:6138;policy - zone drifting not allowed;nftables policy gh797;
180;services.at:1;services;nftables policy service;
181;ports.at:1;ports;nftables policy port;
182;source_ports.at:1;source ports;nftables policy source_port;
183;forward_ports.at:1;forward ports;nftables policy forward_port;
184;forward_ports.at:199;forward ports (OUTPUT);nftables policy forward_port rhbz2039542;
185;masquerade.at:1;masquerade;nftables policy masquerade gh926;
186;protocols.at:1;protocols;nftables policy protocol;
187;rich_rules.at:1;rich rules;nftables policy rich;
188;icmp_blocks.at:1;ICMP blocks;nftables policy icmp_block;
189;rich_tcp_mss_clamp.at:5;tcp-mss-clamp;nftables tcp-mss-clamp gh1121;
190;rich_destination_ipset.at:1;rich destination ipset;nftables rich ipset;
191;zone.at:1;zone - target;nftables zone;
192;rpfilter.at:1;rpfilter;nftables rpfilter;
193;zone_combine.at:1;zone - combine;nftables zone;
194;startup_failsafe.at:1;startup failsafe - invalid xml;nftables failsafe;
195;startup_failsafe.at:1;startup failsafe - bad zone;nftables failsafe;
196;startup_failsafe.at:1;startup failsafe - bad policy;nftables failsafe;
197;startup_failsafe.at:1;startup failsafe - non-existent service;nftables failsafe;
198;startup_failsafe.at:1;startup failsafe - non-existent icmptype;nftables failsafe;
199;startup_failsafe.at:1;startup failsafe - bad direct;nftables failsafe;
200;startup_failsafe.at:1;startup failsafe - broken stock config;nftables;
201;ipset_defer_native_ipset_creation.at:1;ipset defer native creation;nftables ipset direct rhbz2122678;
202;reset_defaults.at:1;reset defaults;nftables reset;
203;iptables_no_flush_on_shutdown.at:1;avoid iptables flush if using nftables;nftables direct gh863;
204;zone_priority.at:1;zone - priority;nftables zone;
205;nftables_flowtable.at:1;nftables flowtable;nftables flowtable;
206;nftables_counters.at:1;nftables counters;nftables counters;
207;firewall-cmd.at:5;basic options;iptables panic reload gh808;
208;firewall-cmd.at:34;get/list options;iptables zone service icmp;
209;firewall-cmd.at:50;default zone;iptables zone;
210;firewall-cmd.at:62;user zone;iptables zone;
211;firewall-cmd.at:82;zone interfaces;iptables zone;
212;firewall-cmd.at:170;zone sources;iptables zone;
213;firewall-cmd.at:223;services;iptables service;
214;firewall-cmd.at:267;user services;iptables service;
215;firewall-cmd.at:349;ports;iptables port;
216;firewall-cmd.at:406;source ports;iptables port;
217;firewall-cmd.at:443;protocols;iptables protocol;
218;firewall-cmd.at:471;masquerade;iptables masquerade nat;
219;firewall-cmd.at:498;forward;iptables forward gh586 gh613;
220;firewall-cmd.at:686;forward ports;iptables port forward_port;
221;firewall-cmd.at:785;ICMP block;iptables icmp;
222;firewall-cmd.at:831;user ICMP types;iptables icmp;
223;firewall-cmd.at:854;ipset;iptables ipset rhbz1685256;
224;firewall-cmd.at:1063;user helpers;iptables helper;
225;firewall-cmd.at:1091;direct;iptables direct;
226;firewall-cmd.at:1165;direct nat;iptables direct nat;
227;firewall-cmd.at:1190;direct passthrough;iptables direct passthrough;
228;firewall-cmd.at:1228;direct ebtables;iptables direct ebtables;
229;firewall-cmd.at:1274;lockdown;iptables lockdown;
230;firewall-cmd.at:1341;rich rules good;iptables rich;
231;firewall-cmd.at:1375;rich rules audit;iptables rich;
232;firewall-cmd.at:1383;rich rules priority;iptables rich;
233;firewall-cmd.at:1938;rich rules bad;iptables rich;
234;firewall-cmd.at:1981;config validation;iptables check_config;
235;rhbz1514043.at:1;--set-log-denied does not zero config;iptables log_denied rhbz1514043;
236;rhbz1498923.at:1;invalid direct rule causes reload error;iptables direct reload rhbz1498923;
237;pr181.at:1;combined zones name length check;iptables zone gh181;
238;gh287.at:1;ICMP block inversion;iptables icmp gh287;
239;individual_calls.at:1;individual calls;iptables individual_calls;
240;rhbz1534571.at:3;rule deduplication;iptables rhbz1534571;
241;gh290.at:1;invalid syntax in xml files;iptables xml direct gh290;
242;gh290.at:19;invalid syntax in xml files;iptables xml zone gh290;
243;icmp_block_in_forward_chain.at:1;ICMP block not present FORWARD chain;iptables icmp;
244;pr323.at:1;GRE proto helper;iptables helper gh323;
245;rhbz1506742.at:1;ipset with timeout;iptables ipset rhbz1506742 rhbz2055330 gh699 gh908;
246;rhbz1594657.at:1;no log untracked passthrough queries;iptables direct passthrough rhbz1594657;
247;rhbz1571957.at:1;set-log-denied w/ ICMP block inversion;iptables log_denied rhbz1571957 icmp;
248;rhbz1404076.at:1;query single port added with range;iptables port rhbz1404076;
249;gh366.at:1;service destination multiple IP versions;iptables service gh366;
250;rhbz1601610.at:1;ipset duplicate entries;iptables ipset rhbz1601610;
251;gh303.at:1;unicode in XML;iptables xml unicode service gh303;
252;gh335.at:1;forward-port toaddr enables IP forwarding;iptables port forward_port gh335;
253;gh482.at:1;remove forward-port after reload;iptables gh482 rhbz1637675 rich forward_port;
254;gh478.at:1;rich rule marks every packet;iptables rich mark gh478;
255;gh258.at:1;zone dispatch layout;iptables zone gh258 gh441 rhbz1713823;
256;rhbz1715977.at:1;rich rule src/dst with service destination;iptables rich service rhbz1715977 rhbz1729097 rhbz1791783;
257;rhbz1723610.at:1;direct remove-rules per family;iptables direct rhbz1723610 gh385;
258;rhbz1734765.at:1;zone sources ordered by name;iptables zone rhbz1734765 rhbz1421222 gh166 rhbz1738545;
259;gh567.at:1;rich rule source w/ mark action;iptables gh567 rich ipset;
260;rhbz1779835.at:1;ipv6 address with brackets;iptables rhbz1779835 ipset;
261;rhbz1779835.at:16;ipv6 address with brackets;iptables rhbz1779835 zone forward_port rich;
262;gh330.at:1;ipset cleanup on reload/stop;iptables ipset reload gh330 rhbz1682913 rhbz1790948 rhbz1809225;
263;gh599.at:1;writing to log after copytruncate;iptables gh599;
264;rhbz1829104.at:1;direct rule in zone chain;iptables direct rhbz1829104;
265;rhbz1843398.at:1;rich rule source mac;iptables rich rhbz1843398 gh643;
266;rhbz1839781.at:1;service RH-Satellite-6;iptables service rhbz1839781;
267;rhbz1689429.at:1;rich rule invalid priority;iptables rich rhbz1689429;
268;rhbz1483921.at:1;direct and zone mutually exclusive;iptables direct rhbz1483921;
269;rhbz1541077.at:1;hash:mac and family mutually exclusive;iptables ipset rhbz1541077;
270;rhbz1855140.at:1;rich rule icmptypes with one family;iptables rich icmp rhbz1855140;
271;rhbz1871298.at:1;rich rule parsing bottleneck;iptables rich offline rhbz1871298;
272;rhbz1596304.at:1;rich rules strip non-printable characters;iptables rich rhbz1596304;
273;gh703.at:1;add source with mac address;iptables gh703;
274;ipset_netmask_allowed.at:1;ipset netmask allowed type hash:ip;iptables ipset reload;
275;rhbz1940928.at:1;direct -s/-d multiple addresses;iptables direct rhbz1940928 rhbz1949552;
276;rhbz1936896.at:1;ipset type hash:net,net;iptables rhbz1936896;
277;gh795.at:1;ipset entry delete w/ timeout=0;iptables ipset gh794 gh795;
278;rhbz1914935.at:1;zone overlapping ports;iptables zone port rhbz1914935;
279;gh696.at:1;icmp-block-inversion no log blocked;iptables icmp gh696 rhbz1945833;
280;rhbz1917766.at:1;rich rule source with netmask;iptables rich rhbz1917766;
281;rhbz2014383.at:1;same source in two zone xml;iptables zone rhbz2014383;
282;gh874.at:1;policy masquerade w/ ingress interface;iptables policy zone masquerade gh874 gh926;
283;gh881.at:1;ipset entry overlap detect perf;iptables ipset gh881;
284;service_includes_for_builtin.at:1;service include for built-in;iptables dbus service service_includes_for_builtin service_includes_for_built-in;
285;gh940.at:1;log prefix;iptables policy gh940;
286;build_policy_split_wildcard.at:1;build policy split wildcards;iptables gh892 policy;
287;gh1011.at:1;remove entries results in empty;iptables ipset gh1011 rhbz2121985;
288;rhbz2181406.at:1;rich rule limit;iptables rich rhbz2181406;
289;ipset_scale.at:1;ipset scale;iptables ipset gh738;
290;gh1129.at:16;switch backend to nftables and reload;iptables gh1129;
291;gh1146.at:1;policy with mixed family zone source;iptables policy gh1146;
292;gh1152.at:1;list-all identical content;iptables cli gh1152;
293;rhbz2222044.at:1;duplicate rules after restart;iptables rhbz2222044;
294;python.at:3;firewalld_test.py;iptables python;
295;python.at:8;firewalld_config.py;iptables python;
296;python.at:13;firewalld_rich.py;iptables python;
297;python.at:18;firewalld_direct.py;iptables python;
298;rfc3964_ipv4.at:1;RFC3964_IPv4;iptables rfc3964_ipv4;
299;service_include.at:1;service include;iptables service xml gh273 rhbz1720300 gh707 gh1075;
300;helpers_custom.at:1;customer helpers;iptables helpers rhbz1733066 gh514 rhbz1769520;
301;policy.at:5;policy - xml;iptables policy xml;
302;policy.at:79;policy - create;iptables policy;
303;policy.at:96;policy - name;iptables policy;
304;policy.at:109;policy - list;iptables policy;
305;policy.at:231;policy - options;iptables policy;
306;policy.at:286;policy - priority;iptables policy;
307;policy.at:470;policy - zones;iptables policy;
308;policy.at:822;policy - dispatch;iptables policy;
309;policy.at:5351;policy - interfaces/sources;iptables policy;
310;policy.at:6072;policy - target;iptables policy;
311;policy.at:6121;policy - from file;iptables policy;
312;policy.at:6138;policy - zone drifting not allowed;iptables policy gh797;
313;services.at:1;services;iptables policy service;
314;ports.at:1;ports;iptables policy port;
315;source_ports.at:1;source ports;iptables policy source_port;
316;forward_ports.at:1;forward ports;iptables policy forward_port;
317;forward_ports.at:199;forward ports (OUTPUT);iptables policy forward_port rhbz2039542;
318;masquerade.at:1;masquerade;iptables policy masquerade gh926;
319;protocols.at:1;protocols;iptables policy protocol;
320;rich_rules.at:1;rich rules;iptables policy rich;
321;icmp_blocks.at:1;ICMP blocks;iptables policy icmp_block;
322;rich_tcp_mss_clamp.at:5;tcp-mss-clamp;iptables tcp-mss-clamp gh1121;
323;rich_destination_ipset.at:1;rich destination ipset;iptables rich ipset;
324;zone.at:1;zone - target;iptables zone;
325;rpfilter.at:1;rpfilter;iptables rpfilter;
326;zone_combine.at:1;zone - combine;iptables zone;
327;reset_defaults.at:1;reset defaults;iptables reset;
328;zone_priority.at:1;zone - priority;iptables zone;
"
# List of the all the test groups.
at_groups_all=`$as_echo "$at_help_all" | sed 's/;.*//'`

# at_fn_validate_ranges NAME...
# -----------------------------
# Validate and normalize the test group number contained in each variable
# NAME. Leading zeroes are treated as decimal.
at_fn_validate_ranges ()
{
  for at_grp
  do
    eval at_value=\$$at_grp
    if test $at_value -lt 1 || test $at_value -gt 328; then
      $as_echo "invalid test group: $at_value" >&2
      exit 1
    fi
    case $at_value in
      0*) # We want to treat leading 0 as decimal, like expr and test, but
	  # AS_VAR_ARITH treats it as octal if it uses $(( )).
	  # With XSI shells, ${at_value#${at_value%%[1-9]*}} avoids the
	  # expr fork, but it is not worth the effort to determine if the
	  # shell supports XSI when the user can just avoid leading 0.
	  eval $at_grp='`expr $at_value + 0`' ;;
    esac
  done
}

at_prev=
for at_option
do
  # If the previous option needs an argument, assign it.
  if test -n "$at_prev"; then
    at_option=$at_prev=$at_option
    at_prev=
  fi

  case $at_option in
  *=?*) at_optarg=`expr "X$at_option" : '[^=]*=\(.*\)'` ;;
  *)    at_optarg= ;;
  esac

  # Accept the important Cygnus configure options, so we can diagnose typos.

  case $at_option in
    --help | -h )
	at_help_p=:
	;;

    --list | -l )
	at_list_p=:
	;;

    --version | -V )
	at_version_p=:
	;;

    --clean | -c )
	at_clean=:
	;;

    --color )
	at_color=always
	;;
    --color=* )
	case $at_optarg in
	no | never | none) at_color=never ;;
	auto | tty | if-tty) at_color=auto ;;
	always | yes | force) at_color=always ;;
	*) at_optname=`echo " $at_option" | sed 's/^ //; s/=.*//'`
	   as_fn_error $? "unrecognized argument to $at_optname: $at_optarg" ;;
	esac
	;;

    --debug | -d )
	at_debug_p=:
	;;

    --errexit | -e )
	at_debug_p=:
	at_errexit_p=:
	;;

    --verbose | -v )
	at_verbose=; at_quiet=:
	;;

    --trace | -x )
	at_traceon='set -x'
	at_trace_echo=echo
	at_check_filter_trace=at_fn_filter_trace
	;;

    [0-9] | [0-9][0-9] | [0-9][0-9][0-9] | [0-9][0-9][0-9][0-9])
	at_fn_validate_ranges at_option
	as_fn_append at_groups "$at_option$as_nl"
	;;

    # Ranges
    [0-9]- | [0-9][0-9]- | [0-9][0-9][0-9]- | [0-9][0-9][0-9][0-9]-)
	at_range_start=`echo $at_option |tr -d X-`
	at_fn_validate_ranges at_range_start
	at_range=`$as_echo "$at_groups_all" | \
	  sed -ne '/^'$at_range_start'$/,$p'`
	as_fn_append at_groups "$at_range$as_nl"
	;;

    -[0-9] | -[0-9][0-9] | -[0-9][0-9][0-9] | -[0-9][0-9][0-9][0-9])
	at_range_end=`echo $at_option |tr -d X-`
	at_fn_validate_ranges at_range_end
	at_range=`$as_echo "$at_groups_all" | \
	  sed -ne '1,/^'$at_range_end'$/p'`
	as_fn_append at_groups "$at_range$as_nl"
	;;

    [0-9]-[0-9] | [0-9]-[0-9][0-9] | [0-9]-[0-9][0-9][0-9] | \
    [0-9]-[0-9][0-9][0-9][0-9] | [0-9][0-9]-[0-9][0-9] | \
    [0-9][0-9]-[0-9][0-9][0-9] | [0-9][0-9]-[0-9][0-9][0-9][0-9] | \
    [0-9][0-9][0-9]-[0-9][0-9][0-9] | \
    [0-9][0-9][0-9]-[0-9][0-9][0-9][0-9] | \
    [0-9][0-9][0-9][0-9]-[0-9][0-9][0-9][0-9] )
	at_range_start=`expr $at_option : '\(.*\)-'`
	at_range_end=`expr $at_option : '.*-\(.*\)'`
	if test $at_range_start -gt $at_range_end; then
	  at_tmp=$at_range_end
	  at_range_end=$at_range_start
	  at_range_start=$at_tmp
	fi
	at_fn_validate_ranges at_range_start at_range_end
	at_range=`$as_echo "$at_groups_all" | \
	  sed -ne '/^'$at_range_start'$/,/^'$at_range_end'$/p'`
	as_fn_append at_groups "$at_range$as_nl"
	;;

    # Directory selection.
    --directory | -C )
	at_prev=--directory
	;;
    --directory=* )
	at_change_dir=:
	at_dir=$at_optarg
	if test x- = "x$at_dir" ; then
	  at_dir=./-
	fi
	;;

    # Parallel execution.
    --jobs | -j )
	at_jobs=0
	;;
    --jobs=* | -j[0-9]* )
	if test -n "$at_optarg"; then
	  at_jobs=$at_optarg
	else
	  at_jobs=`expr X$at_option : 'X-j\(.*\)'`
	fi
	case $at_jobs in *[!0-9]*)
	  at_optname=`echo " $at_option" | sed 's/^ //; s/[0-9=].*//'`
	  as_fn_error $? "non-numeric argument to $at_optname: $at_jobs" ;;
	esac
	;;

    # Keywords.
    --keywords | -k )
	at_prev=--keywords
	;;
    --keywords=* )
	at_groups_selected=$at_help_all
	at_save_IFS=$IFS
	IFS=,
	set X $at_optarg
	shift
	IFS=$at_save_IFS
	for at_keyword
	do
	  at_invert=
	  case $at_keyword in
	  '!'*)
	    at_invert="-v"
	    at_keyword=`expr "X$at_keyword" : 'X!\(.*\)'`
	    ;;
	  esac
	  # It is on purpose that we match the test group titles too.
	  at_groups_selected=`$as_echo "$at_groups_selected" |
	      grep -i $at_invert "^[1-9][^;]*;.*[; ]$at_keyword[ ;]"`
	done
	# Smash the keywords.
	at_groups_selected=`$as_echo "$at_groups_selected" | sed 's/;.*//'`
	as_fn_append at_groups "$at_groups_selected$as_nl"
	;;
    --recheck)
	at_recheck=:
	;;

    *=*)
	at_envvar=`expr "x$at_option" : 'x\([^=]*\)='`
	# Reject names that are not valid shell variable names.
	case $at_envvar in
	  '' | [0-9]* | *[!_$as_cr_alnum]* )
	    as_fn_error $? "invalid variable name: \`$at_envvar'" ;;
	esac
	at_value=`$as_echo "$at_optarg" | sed "s/'/'\\\\\\\\''/g"`
	# Export now, but save eval for later and for debug scripts.
	export $at_envvar
	as_fn_append at_debug_args " $at_envvar='$at_value'"
	;;

     *) $as_echo "$as_me: invalid option: $at_option" >&2
	$as_echo "Try \`$0 --help' for more information." >&2
	exit 1
	;;
  esac
done

# Verify our last option didn't require an argument
if test -n "$at_prev"; then :
  as_fn_error $? "\`$at_prev' requires an argument"
fi

# The file containing the suite.
at_suite_log=$at_dir/$as_me.log

# Selected test groups.
if test -z "$at_groups$at_recheck"; then
  at_groups=$at_groups_all
else
  if test -n "$at_recheck" && test -r "$at_suite_log"; then
    at_oldfails=`sed -n '
      /^Failed tests:$/,/^Skipped tests:$/{
	s/^[ ]*\([1-9][0-9]*\):.*/\1/p
      }
      /^Unexpected passes:$/,/^## Detailed failed tests/{
	s/^[ ]*\([1-9][0-9]*\):.*/\1/p
      }
      /^## Detailed failed tests/q
      ' "$at_suite_log"`
    as_fn_append at_groups "$at_oldfails$as_nl"
  fi
  # Sort the tests, removing duplicates.
  at_groups=`$as_echo "$at_groups" | sort -nu | sed '/^$/d'`
fi

if test x"$at_color" = xalways \
   || { test x"$at_color" = xauto && test -t 1; }; then
  at_red=`printf '\033[0;31m'`
  at_grn=`printf '\033[0;32m'`
  at_lgn=`printf '\033[1;32m'`
  at_blu=`printf '\033[1;34m'`
  at_std=`printf '\033[m'`
else
  at_red= at_grn= at_lgn= at_blu= at_std=
fi

# Help message.
if $at_help_p; then
  cat <<_ATEOF || at_write_fail=1
Usage: $0 [OPTION]... [VARIABLE=VALUE]... [TESTS]

Run all the tests, or the selected TESTS, given by numeric ranges, and
save a detailed log file.  Upon failure, create debugging scripts.

Do not change environment variables directly.  Instead, set them via
command line arguments.  Set \`AUTOTEST_PATH' to select the executables
to exercise.  Each relative directory is expanded as build and source
directories relative to the top level of this distribution.
E.g., from within the build directory /tmp/foo-1.0, invoking this:

  $ $0 AUTOTEST_PATH=bin

is equivalent to the following, assuming the source directory is /src/foo-1.0:

  PATH=/tmp/foo-1.0/bin:/src/foo-1.0/bin:\$PATH $0
_ATEOF
cat <<_ATEOF || at_write_fail=1

Operation modes:
  -h, --help     print the help message, then exit
  -V, --version  print version number, then exit
  -c, --clean    remove all the files this test suite might create and exit
  -l, --list     describes all the tests, or the selected TESTS
_ATEOF
cat <<_ATEOF || at_write_fail=1

Execution tuning:
  -C, --directory=DIR
                 change to directory DIR before starting
      --color[=never|auto|always]
                 disable colored test results, or enable even without terminal
  -j, --jobs[=N]
                 Allow N jobs at once; infinite jobs with no arg (default 1)
  -k, --keywords=KEYWORDS
                 select the tests matching all the comma-separated KEYWORDS
                 multiple \`-k' accumulate; prefixed \`!' negates a KEYWORD
      --recheck  select all tests that failed or passed unexpectedly last time
  -e, --errexit  abort as soon as a test fails; implies --debug
  -v, --verbose  force more detailed output
                 default for debugging scripts
  -d, --debug    inhibit clean up and top-level logging
                 default for debugging scripts
  -x, --trace    enable tests shell tracing
_ATEOF
cat <<_ATEOF || at_write_fail=1

Report bugs to <https://github.com/firewalld/firewalld>.
firewalld home page: <http://firewalld.org/>.
_ATEOF
  exit $at_write_fail
fi

# List of tests.
if $at_list_p; then
  cat <<_ATEOF || at_write_fail=1
firewalld 2.0.1 test suite test groups:

 NUM: FILE-NAME:LINE     TEST-GROUP-NAME
      KEYWORDS

_ATEOF
  # Pass an empty line as separator between selected groups and help.
  $as_echo "$at_groups$as_nl$as_nl$at_help_all" |
    awk 'NF == 1 && FS != ";" {
	   selected[$ 1] = 1
	   next
	 }
	 /^$/ { FS = ";" }
	 NF > 0 {
	   if (selected[$ 1]) {
	     printf " %3d: %-18s %s\n", $ 1, $ 2, $ 3
	     if ($ 4) {
	       lmax = 79
	       indent = "     "
	       line = indent
	       len = length (line)
	       n = split ($ 4, a, " ")
	       for (i = 1; i <= n; i++) {
		 l = length (a[i]) + 1
		 if (i > 1 && len + l > lmax) {
		   print line
		   line = indent " " a[i]
		   len = length (line)
		 } else {
		   line = line " " a[i]
		   len += l
		 }
	       }
	       if (n)
		 print line
	     }
	   }
	 }' || at_write_fail=1
  exit $at_write_fail
fi
if $at_version_p; then
  $as_echo "$as_me (firewalld 2.0.1)" &&
  cat <<\_ATEOF || at_write_fail=1

Copyright (C) 2012 Free Software Foundation, Inc.
This test suite is free software; the Free Software Foundation gives
unlimited permission to copy, distribute and modify it.
_ATEOF
  exit $at_write_fail
fi

# Should we print banners?  Yes if more than one test is run.
case $at_groups in #(
  *$as_nl* )
      at_print_banners=: ;; #(
  * ) at_print_banners=false ;;
esac
# Text for banner N, set to a single space once printed.
# Banner 1. firewall-offline-cmd.at:1
# Category starts at test group 1.
at_banner_text_1="firewall-offline-cmd"
# Banner 2. features.at:1
# Category starts at test group 29.
at_banner_text_2="features (offline)"
# Banner 3. dbus.at:1
# Category starts at test group 62.
at_banner_text_3="dbus"
# Banner 4. firewall-cmd.at:1
# Category starts at test group 73.
at_banner_text_4="firewall-cmd (nftables)"
# Banner 5. regression.at:1
# Category starts at test group 101.
at_banner_text_5="regression (nftables)"
# Banner 6. python.at:1
# Category starts at test group 161.
at_banner_text_6="python (nftables)"
# Banner 7. features.at:1
# Category starts at test group 165.
at_banner_text_7="features (nftables)"
# Banner 8. firewall-cmd.at:1
# Category starts at test group 207.
at_banner_text_8="firewall-cmd (iptables)"
# Banner 9. regression.at:1
# Category starts at test group 235.
at_banner_text_9="regression (iptables)"
# Banner 10. python.at:1
# Category starts at test group 294.
at_banner_text_10="python (iptables)"
# Banner 11. features.at:1
# Category starts at test group 298.
at_banner_text_11="features (iptables)"

# Take any -C into account.
if $at_change_dir ; then
  test x != "x$at_dir" && cd "$at_dir" \
    || as_fn_error $? "unable to change directory"
  at_dir=`pwd`
fi

# Load the config files for any default variable assignments.
for at_file in atconfig atlocal
do
  test -r $at_file || continue
  . ./$at_file || as_fn_error $? "invalid content: $at_file"
done

# Autoconf <=2.59b set at_top_builddir instead of at_top_build_prefix:
: "${at_top_build_prefix=$at_top_builddir}"

# Perform any assignments requested during argument parsing.
eval "$at_debug_args"

# atconfig delivers names relative to the directory the test suite is
# in, but the groups themselves are run in testsuite-dir/group-dir.
if test -n "$at_top_srcdir"; then
  builddir=../..
  for at_dir_var in srcdir top_srcdir top_build_prefix
  do
    eval at_val=\$at_$at_dir_var
    case $at_val in
      [\\/$]* | ?:[\\/]* ) at_prefix= ;;
      *) at_prefix=../../ ;;
    esac
    eval "$at_dir_var=\$at_prefix\$at_val"
  done
fi

## -------------------- ##
## Directory structure. ##
## -------------------- ##

# This is the set of directories and files used by this script
# (non-literals are capitalized):
#
# TESTSUITE         - the testsuite
# TESTSUITE.log     - summarizes the complete testsuite run
# TESTSUITE.dir/    - created during a run, remains after -d or failed test
# + at-groups/      - during a run: status of all groups in run
# | + NNN/          - during a run: meta-data about test group NNN
# | | + check-line  - location (source file and line) of current AT_CHECK
# | | + status      - exit status of current AT_CHECK
# | | + stdout      - stdout of current AT_CHECK
# | | + stder1      - stderr, including trace
# | | + stderr      - stderr, with trace filtered out
# | | + test-source - portion of testsuite that defines group
# | | + times       - timestamps for computing duration
# | | + pass        - created if group passed
# | | + xpass       - created if group xpassed
# | | + fail        - created if group failed
# | | + xfail       - created if group xfailed
# | | + skip        - created if group skipped
# + at-stop         - during a run: end the run if this file exists
# + at-source-lines - during a run: cache of TESTSUITE line numbers for extraction
# + 0..NNN/         - created for each group NNN, remains after -d or failed test
# | + TESTSUITE.log - summarizes the group results
# | + ...           - files created during the group

# The directory the whole suite works in.
# Should be absolute to let the user `cd' at will.
at_suite_dir=$at_dir/$as_me.dir
# The file containing the suite ($at_dir might have changed since earlier).
at_suite_log=$at_dir/$as_me.log
# The directory containing helper files per test group.
at_helper_dir=$at_suite_dir/at-groups
# Stop file: if it exists, do not start new jobs.
at_stop_file=$at_suite_dir/at-stop
# The fifo used for the job dispatcher.
at_job_fifo=$at_suite_dir/at-job-fifo

if $at_clean; then
  test -d "$at_suite_dir" &&
    find "$at_suite_dir" -type d ! -perm -700 -exec chmod u+rwx \{\} \;
  rm -f -r "$at_suite_dir" "$at_suite_log"
  exit $?
fi

# Don't take risks: use only absolute directories in PATH.
#
# For stand-alone test suites (ie. atconfig was not found),
# AUTOTEST_PATH is relative to `.'.
#
# For embedded test suites, AUTOTEST_PATH is relative to the top level
# of the package.  Then expand it into build/src parts, since users
# may create executables in both places.
AUTOTEST_PATH=`$as_echo "$AUTOTEST_PATH" | sed "s|:|$PATH_SEPARATOR|g"`
at_path=
as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $AUTOTEST_PATH $PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    test -n "$at_path" && as_fn_append at_path $PATH_SEPARATOR
case $as_dir in
  [\\/]* | ?:[\\/]* )
    as_fn_append at_path "$as_dir"
    ;;
  * )
    if test -z "$at_top_build_prefix"; then
      # Stand-alone test suite.
      as_fn_append at_path "$as_dir"
    else
      # Embedded test suite.
      as_fn_append at_path "$at_top_build_prefix$as_dir$PATH_SEPARATOR"
      as_fn_append at_path "$at_top_srcdir/$as_dir"
    fi
    ;;
esac
  done
IFS=$as_save_IFS


# Now build and simplify PATH.
#
# There might be directories that don't exist, but don't redirect
# builtins' (eg., cd) stderr directly: Ultrix's sh hates that.
at_new_path=
as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $at_path
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    test -d "$as_dir" || continue
case $as_dir in
  [\\/]* | ?:[\\/]* ) ;;
  * ) as_dir=`(cd "$as_dir" && pwd) 2>/dev/null` ;;
esac
case $PATH_SEPARATOR$at_new_path$PATH_SEPARATOR in
  *$PATH_SEPARATOR$as_dir$PATH_SEPARATOR*) ;;
  $PATH_SEPARATOR$PATH_SEPARATOR) at_new_path=$as_dir ;;
  *) as_fn_append at_new_path "$PATH_SEPARATOR$as_dir" ;;
esac
  done
IFS=$as_save_IFS

PATH=$at_new_path
export PATH

# Setting up the FDs.



# 5 is the log file.  Not to be overwritten if `-d'.
if $at_debug_p; then
  at_suite_log=/dev/null
else
  : >"$at_suite_log"
fi
exec 5>>"$at_suite_log"

# Banners and logs.
$as_echo "## --------------------------- ##
## firewalld 2.0.1 test suite. ##
## --------------------------- ##"
{
  $as_echo "## --------------------------- ##
## firewalld 2.0.1 test suite. ##
## --------------------------- ##"
  echo

  $as_echo "$as_me: command line was:"
  $as_echo "  \$ $0 $at_cli_args"
  echo

  # If ChangeLog exists, list a few lines in case it might help determining
  # the exact version.
  if test -n "$at_top_srcdir" && test -f "$at_top_srcdir/ChangeLog"; then
    $as_echo "## ---------- ##
## ChangeLog. ##
## ---------- ##"
    echo
    sed 's/^/| /;10q' "$at_top_srcdir/ChangeLog"
    echo
  fi

  {
cat <<_ASUNAME
## --------- ##
## Platform. ##
## --------- ##

hostname = `(hostname || uname -n) 2>/dev/null | sed 1q`
uname -m = `(uname -m) 2>/dev/null || echo unknown`
uname -r = `(uname -r) 2>/dev/null || echo unknown`
uname -s = `(uname -s) 2>/dev/null || echo unknown`
uname -v = `(uname -v) 2>/dev/null || echo unknown`

/usr/bin/uname -p = `(/usr/bin/uname -p) 2>/dev/null || echo unknown`
/bin/uname -X     = `(/bin/uname -X) 2>/dev/null     || echo unknown`

/bin/arch              = `(/bin/arch) 2>/dev/null              || echo unknown`
/usr/bin/arch -k       = `(/usr/bin/arch -k) 2>/dev/null       || echo unknown`
/usr/convex/getsysinfo = `(/usr/convex/getsysinfo) 2>/dev/null || echo unknown`
/usr/bin/hostinfo      = `(/usr/bin/hostinfo) 2>/dev/null      || echo unknown`
/bin/machine           = `(/bin/machine) 2>/dev/null           || echo unknown`
/usr/bin/oslevel       = `(/usr/bin/oslevel) 2>/dev/null       || echo unknown`
/bin/universe          = `(/bin/universe) 2>/dev/null          || echo unknown`

_ASUNAME

as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    $as_echo "PATH: $as_dir"
  done
IFS=$as_save_IFS

}
  echo

  # Contents of the config files.
  for at_file in atconfig atlocal
  do
    test -r $at_file || continue
    $as_echo "$as_me: $at_file:"
    sed 's/^/| /' $at_file
    echo
  done
} >&5


## ------------------------- ##
## Autotest shell functions. ##
## ------------------------- ##

# at_fn_banner NUMBER
# -------------------
# Output banner NUMBER, provided the testsuite is running multiple groups and
# this particular banner has not yet been printed.
at_fn_banner ()
{
  $at_print_banners || return 0
  eval at_banner_text=\$at_banner_text_$1
  test "x$at_banner_text" = "x " && return 0
  eval "at_banner_text_$1=\" \""
  if test -z "$at_banner_text"; then
    $at_first || echo
  else
    $as_echo "$as_nl$at_banner_text$as_nl"
  fi
} # at_fn_banner

# at_fn_check_prepare_notrace REASON LINE
# ---------------------------------------
# Perform AT_CHECK preparations for the command at LINE for an untraceable
# command; REASON is the reason for disabling tracing.
at_fn_check_prepare_notrace ()
{
  $at_trace_echo "Not enabling shell tracing (command contains $1)"
  $as_echo "$2" >"$at_check_line_file"
  at_check_trace=: at_check_filter=:
  : >"$at_stdout"; : >"$at_stderr"
}

# at_fn_check_prepare_trace LINE
# ------------------------------
# Perform AT_CHECK preparations for the command at LINE for a traceable
# command.
at_fn_check_prepare_trace ()
{
  $as_echo "$1" >"$at_check_line_file"
  at_check_trace=$at_traceon at_check_filter=$at_check_filter_trace
  : >"$at_stdout"; : >"$at_stderr"
}

# at_fn_check_prepare_dynamic COMMAND LINE
# ----------------------------------------
# Decide if COMMAND at LINE is traceable at runtime, and call the appropriate
# preparation function.
at_fn_check_prepare_dynamic ()
{
  case $1 in
    *$as_nl*)
      at_fn_check_prepare_notrace 'an embedded newline' "$2" ;;
    *)
      at_fn_check_prepare_trace "$2" ;;
  esac
}

# at_fn_filter_trace
# ------------------
# Remove the lines in the file "$at_stderr" generated by "set -x" and print
# them to stderr.
at_fn_filter_trace ()
{
  mv "$at_stderr" "$at_stder1"
  grep '^ *+' "$at_stder1" >&2
  grep -v '^ *+' "$at_stder1" >"$at_stderr"
}

# at_fn_log_failure FILE-LIST
# ---------------------------
# Copy the files in the list on stdout with a "> " prefix, and exit the shell
# with a failure exit code.
at_fn_log_failure ()
{
  for file
    do $as_echo "$file:"; sed 's/^/> /' "$file"; done
  echo 1 > "$at_status_file"
  exit 1
}

# at_fn_check_skip EXIT-CODE LINE
# -------------------------------
# Check whether EXIT-CODE is a special exit code (77 or 99), and if so exit
# the test group subshell with that same exit code. Use LINE in any report
# about test failure.
at_fn_check_skip ()
{
  case $1 in
    99) echo 99 > "$at_status_file"; at_failed=:
	$as_echo "$2: hard failure"; exit 99;;
    77) echo 77 > "$at_status_file"; exit 77;;
  esac
}

# at_fn_check_status EXPECTED EXIT-CODE LINE
# ------------------------------------------
# Check whether EXIT-CODE is the EXPECTED exit code, and if so do nothing.
# Otherwise, if it is 77 or 99, exit the test group subshell with that same
# exit code; if it is anything else print an error message referring to LINE,
# and fail the test.
at_fn_check_status ()
{
  case $2 in
    $1 ) ;;
    77) echo 77 > "$at_status_file"; exit 77;;
    99) echo 99 > "$at_status_file"; at_failed=:
	$as_echo "$3: hard failure"; exit 99;;
    *) $as_echo "$3: exit code was $2, expected $1"
      at_failed=:;;
  esac
}

# at_fn_diff_devnull FILE
# -----------------------
# Emit a diff between /dev/null and FILE. Uses "test -s" to avoid useless diff
# invocations.
at_fn_diff_devnull ()
{
  test -s "$1" || return 0
  $at_diff "$at_devnull" "$1"
}

# at_fn_test NUMBER
# -----------------
# Parse out test NUMBER from the tail of this file.
at_fn_test ()
{
  eval at_sed=\$at_sed$1
  sed "$at_sed" "$at_myself" > "$at_test_source"
}

# at_fn_create_debugging_script
# -----------------------------
# Create the debugging script $at_group_dir/run which will reproduce the
# current test group.
at_fn_create_debugging_script ()
{
  {
    echo "#! /bin/sh" &&
    echo 'test "${ZSH_VERSION+set}" = set && alias -g '\''${1+"$@"}'\''='\''"$@"'\''' &&
    $as_echo "cd '$at_dir'" &&
    $as_echo "exec \${CONFIG_SHELL-$SHELL} \"$at_myself\" -v -d $at_debug_args $at_group \${1+\"\$@\"}" &&
    echo 'exit 1'
  } >"$at_group_dir/run" &&
  chmod +x "$at_group_dir/run"
}

## -------------------------------- ##
## End of autotest shell functions. ##
## -------------------------------- ##
{
  $as_echo "## ---------------- ##
## Tested programs. ##
## ---------------- ##"
  echo
} >&5

# Report what programs are being tested.
for at_program in : $at_tested
do
  test "$at_program" = : && continue
  case $at_program in
    [\\/]* | ?:[\\/]* ) $at_program_=$at_program ;;
    * )
    as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    test -f "$as_dir/$at_program" && break
  done
IFS=$as_save_IFS

    at_program_=$as_dir/$at_program ;;
  esac
  if test -f "$at_program_"; then
    {
      $as_echo "$at_srcdir/testsuite.at:1: $at_program_ --version"
      "$at_program_" --version </dev/null
      echo
    } >&5 2>&1
  else
    as_fn_error $? "cannot find $at_program" "$LINENO" 5
  fi
done

{
  $as_echo "## ------------------ ##
## Running the tests. ##
## ------------------ ##"
} >&5

at_start_date=`date`
at_start_time=`date +%s 2>/dev/null`
$as_echo "$as_me: starting at: $at_start_date" >&5

# Create the master directory if it doesn't already exist.
as_dir="$at_suite_dir"; as_fn_mkdir_p ||
  as_fn_error $? "cannot create \`$at_suite_dir'" "$LINENO" 5

# Can we diff with `/dev/null'?  DU 5.0 refuses.
if diff /dev/null /dev/null >/dev/null 2>&1; then
  at_devnull=/dev/null
else
  at_devnull=$at_suite_dir/devnull
  >"$at_devnull"
fi

# Use `diff -u' when possible.
if at_diff=`diff -u "$at_devnull" "$at_devnull" 2>&1` && test -z "$at_diff"
then
  at_diff='diff -u'
else
  at_diff=diff
fi

# Get the last needed group.
for at_group in : $at_groups; do :; done

# Extract the start and end lines of each test group at the tail
# of this file
awk '
BEGIN { FS="" }
/^#AT_START_/ {
  start = NR
}
/^#AT_STOP_/ {
  test = substr ($ 0, 10)
  print "at_sed" test "=\"1," start "d;" (NR-1) "q\""
  if (test == "'"$at_group"'") exit
}' "$at_myself" > "$at_suite_dir/at-source-lines" &&
. "$at_suite_dir/at-source-lines" ||
  as_fn_error $? "cannot create test line number cache" "$LINENO" 5
rm -f "$at_suite_dir/at-source-lines"

# Set number of jobs for `-j'; avoid more jobs than test groups.
set X $at_groups; shift; at_max_jobs=$#
if test $at_max_jobs -eq 0; then
  at_jobs=1
fi
if test $at_jobs -ne 1 &&
   { test $at_jobs -eq 0 || test $at_jobs -gt $at_max_jobs; }; then
  at_jobs=$at_max_jobs
fi

# If parallel mode, don't output banners, don't split summary lines.
if test $at_jobs -ne 1; then
  at_print_banners=false
  at_quiet=:
fi

# Set up helper dirs.
rm -rf "$at_helper_dir" &&
mkdir "$at_helper_dir" &&
cd "$at_helper_dir" &&
{ test -z "$at_groups" || mkdir $at_groups; } ||
as_fn_error $? "testsuite directory setup failed" "$LINENO" 5

# Functions for running a test group.  We leave the actual
# test group execution outside of a shell function in order
# to avoid hitting zsh 4.x exit status bugs.

# at_fn_group_prepare
# -------------------
# Prepare for running a test group.
at_fn_group_prepare ()
{
  # The directory for additional per-group helper files.
  at_job_dir=$at_helper_dir/$at_group
  # The file containing the location of the last AT_CHECK.
  at_check_line_file=$at_job_dir/check-line
  # The file containing the exit status of the last command.
  at_status_file=$at_job_dir/status
  # The files containing the output of the tested commands.
  at_stdout=$at_job_dir/stdout
  at_stder1=$at_job_dir/stder1
  at_stderr=$at_job_dir/stderr
  # The file containing the code for a test group.
  at_test_source=$at_job_dir/test-source
  # The file containing dates.
  at_times_file=$at_job_dir/times

  # Be sure to come back to the top test directory.
  cd "$at_suite_dir"

  # Clearly separate the test groups when verbose.
  $at_first || $at_verbose echo

  at_group_normalized=$at_group

  eval 'while :; do
    case $at_group_normalized in #(
    '"$at_format"'*) break;;
    esac
    at_group_normalized=0$at_group_normalized
  done'


  # Create a fresh directory for the next test group, and enter.
  # If one already exists, the user may have invoked ./run from
  # within that directory; we remove the contents, but not the
  # directory itself, so that we aren't pulling the rug out from
  # under the shell's notion of the current directory.
  at_group_dir=$at_suite_dir/$at_group_normalized
  at_group_log=$at_group_dir/$as_me.log
  if test -d "$at_group_dir"; then
  find "$at_group_dir" -type d ! -perm -700 -exec chmod u+rwx {} \;
  rm -fr "$at_group_dir"/* "$at_group_dir"/.[!.] "$at_group_dir"/.??*
fi ||
    { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: test directory for $at_group_normalized could not be cleaned" >&5
$as_echo "$as_me: WARNING: test directory for $at_group_normalized could not be cleaned" >&2;}
  # Be tolerant if the above `rm' was not able to remove the directory.
  as_dir="$at_group_dir"; as_fn_mkdir_p

  echo 0 > "$at_status_file"

  # In verbose mode, append to the log file *and* show on
  # the standard output; in quiet mode only write to the log.
  if test -z "$at_verbose"; then
    at_tee_pipe='tee -a "$at_group_log"'
  else
    at_tee_pipe='cat >> "$at_group_log"'
  fi
}

# at_fn_group_banner ORDINAL LINE DESC PAD [BANNER]
# -------------------------------------------------
# Declare the test group ORDINAL, located at LINE with group description DESC,
# and residing under BANNER. Use PAD to align the status column.
at_fn_group_banner ()
{
  at_setup_line="$2"
  test -n "$5" && at_fn_banner $5
  at_desc="$3"
  case $1 in
    [0-9])      at_desc_line="  $1: ";;
    [0-9][0-9]) at_desc_line=" $1: " ;;
    *)          at_desc_line="$1: "  ;;
  esac
  as_fn_append at_desc_line "$3$4"
  $at_quiet $as_echo_n "$at_desc_line"
  echo "#                             -*- compilation -*-" >> "$at_group_log"
}

# at_fn_group_postprocess
# -----------------------
# Perform cleanup after running a test group.
at_fn_group_postprocess ()
{
  # Be sure to come back to the suite directory, in particular
  # since below we might `rm' the group directory we are in currently.
  cd "$at_suite_dir"

  if test ! -f "$at_check_line_file"; then
    sed "s/^ */$as_me: WARNING: /" <<_ATEOF
      A failure happened in a test group before any test could be
      run. This means that test suite is improperly designed.  Please
      report this failure to <https://github.com/firewalld/firewalld>.
_ATEOF
    $as_echo "$at_setup_line" >"$at_check_line_file"
    at_status=99
  fi
  $at_verbose $as_echo_n "$at_group. $at_setup_line: "
  $as_echo_n "$at_group. $at_setup_line: " >> "$at_group_log"
  case $at_xfail:$at_status in
    yes:0)
	at_msg="UNEXPECTED PASS"
	at_res=xpass
	at_errexit=$at_errexit_p
	at_color=$at_red
	;;
    no:0)
	at_msg="ok"
	at_res=pass
	at_errexit=false
	at_color=$at_grn
	;;
    *:77)
	at_msg='skipped ('`cat "$at_check_line_file"`')'
	at_res=skip
	at_errexit=false
	at_color=$at_blu
	;;
    no:* | *:99)
	at_msg='FAILED ('`cat "$at_check_line_file"`')'
	at_res=fail
	at_errexit=$at_errexit_p
	at_color=$at_red
	;;
    yes:*)
	at_msg='expected failure ('`cat "$at_check_line_file"`')'
	at_res=xfail
	at_errexit=false
	at_color=$at_lgn
	;;
  esac
  echo "$at_res" > "$at_job_dir/$at_res"
  # In parallel mode, output the summary line only afterwards.
  if test $at_jobs -ne 1 && test -n "$at_verbose"; then
    $as_echo "$at_desc_line $at_color$at_msg$at_std"
  else
    # Make sure there is a separator even with long titles.
    $as_echo " $at_color$at_msg$at_std"
  fi
  at_log_msg="$at_group. $at_desc ($at_setup_line): $at_msg"
  case $at_status in
    0|77)
      # $at_times_file is only available if the group succeeded.
      # We're not including the group log, so the success message
      # is written in the global log separately.  But we also
      # write to the group log in case they're using -d.
      if test -f "$at_times_file"; then
	at_log_msg="$at_log_msg     ("`sed 1d "$at_times_file"`')'
	rm -f "$at_times_file"
      fi
      $as_echo "$at_log_msg" >> "$at_group_log"
      $as_echo "$at_log_msg" >&5

      # Cleanup the group directory, unless the user wants the files
      # or the success was unexpected.
      if $at_debug_p || test $at_res = xpass; then
	at_fn_create_debugging_script
	if test $at_res = xpass && $at_errexit; then
	  echo stop > "$at_stop_file"
	fi
      else
	if test -d "$at_group_dir"; then
	  find "$at_group_dir" -type d ! -perm -700 -exec chmod u+rwx \{\} \;
	  rm -fr "$at_group_dir"
	fi
	rm -f "$at_test_source"
      fi
      ;;
    *)
      # Upon failure, include the log into the testsuite's global
      # log.  The failure message is written in the group log.  It
      # is later included in the global log.
      $as_echo "$at_log_msg" >> "$at_group_log"

      # Upon failure, keep the group directory for autopsy, and create
      # the debugging script.  With -e, do not start any further tests.
      at_fn_create_debugging_script
      if $at_errexit; then
	echo stop > "$at_stop_file"
      fi
      ;;
  esac
}


## ------------ ##
## Driver loop. ##
## ------------ ##


if (set -m && set +m && set +b) >/dev/null 2>&1; then
  set +b
  at_job_control_on='set -m' at_job_control_off='set +m' at_job_group=-
else
  at_job_control_on=: at_job_control_off=: at_job_group=
fi

for at_signal in 1 2 15; do
  trap 'set +x; set +e
	$at_job_control_off
	at_signal='"$at_signal"'
	echo stop > "$at_stop_file"
	trap "" $at_signal
	at_pgids=
	for at_pgid in `jobs -p 2>/dev/null`; do
	  at_pgids="$at_pgids $at_job_group$at_pgid"
	done
	test -z "$at_pgids" || kill -$at_signal $at_pgids 2>/dev/null
	wait
	if test "$at_jobs" -eq 1 || test -z "$at_verbose"; then
	  echo >&2
	fi
	at_signame=`kill -l $at_signal 2>&1 || echo $at_signal`
	set x $at_signame
	test 0 -gt 2 && at_signame=$at_signal
	{ $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: caught signal $at_signame, bailing out" >&5
$as_echo "$as_me: WARNING: caught signal $at_signame, bailing out" >&2;}
	as_fn_arith 128 + $at_signal && exit_status=$as_val
	as_fn_exit $exit_status' $at_signal
done

rm -f "$at_stop_file"
at_first=:

if test $at_jobs -ne 1 &&
     rm -f "$at_job_fifo" &&
     test -n "$at_job_group" &&
     ( mkfifo "$at_job_fifo" && trap 'exit 1' PIPE STOP TSTP ) 2>/dev/null
then
  # FIFO job dispatcher.

  trap 'at_pids=
	for at_pid in `jobs -p`; do
	  at_pids="$at_pids $at_job_group$at_pid"
	done
	if test -n "$at_pids"; then
	  at_sig=TSTP
	  test "${TMOUT+set}" = set && at_sig=STOP
	  kill -$at_sig $at_pids 2>/dev/null
	fi
	kill -STOP $$
	test -z "$at_pids" || kill -CONT $at_pids 2>/dev/null' TSTP

  echo
  # Turn jobs into a list of numbers, starting from 1.
  at_joblist=`$as_echo "$at_groups" | sed -n 1,${at_jobs}p`

  set X $at_joblist
  shift
  for at_group in $at_groups; do
    $at_job_control_on 2>/dev/null
    (
      # Start one test group.
      $at_job_control_off
      if $at_first; then
	exec 7>"$at_job_fifo"
      else
	exec 6<&-
      fi
      trap 'set +x; set +e
	    trap "" PIPE
	    echo stop > "$at_stop_file"
	    echo >&7
	    as_fn_exit 141' PIPE
      at_fn_group_prepare
      if cd "$at_group_dir" &&
	 at_fn_test $at_group &&
	 . "$at_test_source"
      then :; else
	{ $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: unable to parse test group: $at_group" >&5
$as_echo "$as_me: WARNING: unable to parse test group: $at_group" >&2;}
	at_failed=:
      fi
      at_fn_group_postprocess
      echo >&7
    ) &
    $at_job_control_off
    if $at_first; then
      at_first=false
      exec 6<"$at_job_fifo" 7>"$at_job_fifo"
    fi
    shift # Consume one token.
    if test $# -gt 0; then :; else
      read at_token <&6 || break
      set x $*
    fi
    test -f "$at_stop_file" && break
  done
  exec 7>&-
  # Read back the remaining ($at_jobs - 1) tokens.
  set X $at_joblist
  shift
  if test $# -gt 0; then
    shift
    for at_job
    do
      read at_token
    done <&6
  fi
  exec 6<&-
  wait
else
  # Run serially, avoid forks and other potential surprises.
  for at_group in $at_groups; do
    at_fn_group_prepare
    if cd "$at_group_dir" &&
       at_fn_test $at_group &&
       . "$at_test_source"; then :; else
      { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: unable to parse test group: $at_group" >&5
$as_echo "$as_me: WARNING: unable to parse test group: $at_group" >&2;}
      at_failed=:
    fi
    at_fn_group_postprocess
    test -f "$at_stop_file" && break
    at_first=false
  done
fi

# Wrap up the test suite with summary statistics.
cd "$at_helper_dir"

# Use ?..???? when the list must remain sorted, the faster * otherwise.
at_pass_list=`for f in */pass; do echo $f; done | sed '/\*/d; s,/pass,,'`
at_skip_list=`for f in */skip; do echo $f; done | sed '/\*/d; s,/skip,,'`
at_xfail_list=`for f in */xfail; do echo $f; done | sed '/\*/d; s,/xfail,,'`
at_xpass_list=`for f in ?/xpass ??/xpass ???/xpass ????/xpass; do
		 echo $f; done | sed '/?/d; s,/xpass,,'`
at_fail_list=`for f in ?/fail ??/fail ???/fail ????/fail; do
		echo $f; done | sed '/?/d; s,/fail,,'`

set X $at_pass_list $at_xpass_list $at_xfail_list $at_fail_list $at_skip_list
shift; at_group_count=$#
set X $at_xpass_list; shift; at_xpass_count=$#; at_xpass_list=$*
set X $at_xfail_list; shift; at_xfail_count=$#
set X $at_fail_list; shift; at_fail_count=$#; at_fail_list=$*
set X $at_skip_list; shift; at_skip_count=$#

as_fn_arith $at_group_count - $at_skip_count && at_run_count=$as_val
as_fn_arith $at_xpass_count + $at_fail_count && at_unexpected_count=$as_val
as_fn_arith $at_xfail_count + $at_fail_count && at_total_fail_count=$as_val

# Back to the top directory.
cd "$at_dir"
rm -rf "$at_helper_dir"

# Compute the duration of the suite.
at_stop_date=`date`
at_stop_time=`date +%s 2>/dev/null`
$as_echo "$as_me: ending at: $at_stop_date" >&5
case $at_start_time,$at_stop_time in
  [0-9]*,[0-9]*)
    as_fn_arith $at_stop_time - $at_start_time && at_duration_s=$as_val
    as_fn_arith $at_duration_s / 60 && at_duration_m=$as_val
    as_fn_arith $at_duration_m / 60 && at_duration_h=$as_val
    as_fn_arith $at_duration_s % 60 && at_duration_s=$as_val
    as_fn_arith $at_duration_m % 60 && at_duration_m=$as_val
    at_duration="${at_duration_h}h ${at_duration_m}m ${at_duration_s}s"
    $as_echo "$as_me: test suite duration: $at_duration" >&5
    ;;
esac

echo
$as_echo "## ------------- ##
## Test results. ##
## ------------- ##"
echo
{
  echo
  $as_echo "## ------------- ##
## Test results. ##
## ------------- ##"
  echo
} >&5

if test $at_run_count = 1; then
  at_result="1 test"
  at_were=was
else
  at_result="$at_run_count tests"
  at_were=were
fi
if $at_errexit_p && test $at_unexpected_count != 0; then
  if test $at_xpass_count = 1; then
    at_result="$at_result $at_were run, one passed"
  else
    at_result="$at_result $at_were run, one failed"
  fi
  at_result="$at_result unexpectedly and inhibited subsequent tests."
  at_color=$at_red
else
  # Don't you just love exponential explosion of the number of cases?
  at_color=$at_red
  case $at_xpass_count:$at_fail_count:$at_xfail_count in
    # So far, so good.
    0:0:0) at_result="$at_result $at_were successful." at_color=$at_grn ;;
    0:0:*) at_result="$at_result behaved as expected." at_color=$at_lgn ;;

    # Some unexpected failures
    0:*:0) at_result="$at_result $at_were run,
$at_fail_count failed unexpectedly." ;;

    # Some failures, both expected and unexpected
    0:*:1) at_result="$at_result $at_were run,
$at_total_fail_count failed ($at_xfail_count expected failure)." ;;
    0:*:*) at_result="$at_result $at_were run,
$at_total_fail_count failed ($at_xfail_count expected failures)." ;;

    # No unexpected failures, but some xpasses
    *:0:*) at_result="$at_result $at_were run,
$at_xpass_count passed unexpectedly." ;;

    # No expected failures, but failures and xpasses
    *:1:0) at_result="$at_result $at_were run,
$at_unexpected_count did not behave as expected ($at_fail_count unexpected failure)." ;;
    *:*:0) at_result="$at_result $at_were run,
$at_unexpected_count did not behave as expected ($at_fail_count unexpected failures)." ;;

    # All of them.
    *:*:1) at_result="$at_result $at_were run,
$at_xpass_count passed unexpectedly,
$at_total_fail_count failed ($at_xfail_count expected failure)." ;;
    *:*:*) at_result="$at_result $at_were run,
$at_xpass_count passed unexpectedly,
$at_total_fail_count failed ($at_xfail_count expected failures)." ;;
  esac

  if test $at_skip_count = 0 && test $at_run_count -gt 1; then
    at_result="All $at_result"
  fi
fi

# Now put skips in the mix.
case $at_skip_count in
  0) ;;
  1) at_result="$at_result
1 test was skipped." ;;
  *) at_result="$at_result
$at_skip_count tests were skipped." ;;
esac

if test $at_unexpected_count = 0; then
  echo "$at_color$at_result$at_std"
  echo "$at_result" >&5
else
  echo "${at_color}ERROR: $at_result$at_std" >&2
  echo "ERROR: $at_result" >&5
  {
    echo
    $as_echo "## ------------------------ ##
## Summary of the failures. ##
## ------------------------ ##"

    # Summary of failed and skipped tests.
    if test $at_fail_count != 0; then
      echo "Failed tests:"
      $SHELL "$at_myself" $at_fail_list --list
      echo
    fi
    if test $at_skip_count != 0; then
      echo "Skipped tests:"
      $SHELL "$at_myself" $at_skip_list --list
      echo
    fi
    if test $at_xpass_count != 0; then
      echo "Unexpected passes:"
      $SHELL "$at_myself" $at_xpass_list --list
      echo
    fi
    if test $at_fail_count != 0; then
      $as_echo "## ---------------------- ##
## Detailed failed tests. ##
## ---------------------- ##"
      echo
      for at_group in $at_fail_list
      do
	at_group_normalized=$at_group

  eval 'while :; do
    case $at_group_normalized in #(
    '"$at_format"'*) break;;
    esac
    at_group_normalized=0$at_group_normalized
  done'

	cat "$at_suite_dir/$at_group_normalized/$as_me.log"
	echo
      done
      echo
    fi
    if test -n "$at_top_srcdir"; then
      sed 'h;s/./-/g;s/^.../## /;s/...$/ ##/;p;x;p;x' <<_ASBOX
## ${at_top_build_prefix}config.log ##
_ASBOX
      sed 's/^/| /' ${at_top_build_prefix}config.log
      echo
    fi
  } >&5

  sed 'h;s/./-/g;s/^.../## /;s/...$/ ##/;p;x;p;x' <<_ASBOX
## $as_me.log was created. ##
_ASBOX

  echo
  if $at_debug_p; then
    at_msg='per-test log files'
  else
    at_msg="\`${at_testdir+${at_testdir}/}$as_me.log'"
  fi
  $as_echo "Please send $at_msg and all information you think might help:

   To: <https://github.com/firewalld/firewalld>
   Subject: [firewalld 2.0.1] $as_me: $at_fail_list${at_fail_list:+ failed${at_xpass_list:+, }}$at_xpass_list${at_xpass_list:+ passed unexpectedly}

You may investigate any problem if you feel able to do so, in which
case the test suite provides a good starting point.  Its output may
be found below \`${at_testdir+${at_testdir}/}$as_me.dir'.
"
  exit 1
fi

exit 0

## ------------- ##
## Actual tests. ##
## ------------- ##
#AT_START_1
at_fn_group_banner 1 'firewall-cmd.at:5' \
  "basic options" "                                  " 1
at_xfail=no
(
  $as_echo "1. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:23: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --complete-reload                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --complete-reload                 " "firewall-cmd.at:23"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --complete-reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }
























































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_1
#AT_START_2
at_fn_group_banner 2 'firewall-cmd.at:34' \
  "get/list options" "                               " 1
at_xfail=no
(
  $as_echo "2. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:34"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:34"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:40: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones                 " "firewall-cmd.at:40"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:41: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services                 " "firewall-cmd.at:41"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:42: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes                 " "firewall-cmd.at:42"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:46: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all-zones                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all-zones                 " "firewall-cmd.at:46"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:47: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all                 " "firewall-cmd.at:47"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_2
#AT_START_3
at_fn_group_banner 3 'firewall-cmd.at:50' \
  "default zone" "                                   " 1
at_xfail=no
(
  $as_echo "3. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:50"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:50"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:53: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone" "firewall-cmd.at:53"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:55: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=\"home\""
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=\"home\"" "firewall-cmd.at:55"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone="home"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone" "firewall-cmd.at:56"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "home
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:58: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=\"public\""
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=\"public\"" "firewall-cmd.at:58"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:59: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone" "firewall-cmd.at:59"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_3
#AT_START_4
at_fn_group_banner 4 'firewall-cmd.at:62' \
  "user zone" "                                      " 1
at_xfail=no
(
  $as_echo "4. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:62"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:62"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:66: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone=foobar                 " "firewall-cmd.at:66"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:67: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:67"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:68: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --get-target | grep default                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:68"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --get-target | grep default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:69: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=BAD                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=BAD                 " "firewall-cmd.at:69"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=BAD
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/firewall-cmd.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:70: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=%%REJECT%%                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=%%REJECT%%                 " "firewall-cmd.at:70"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=%%REJECT%%
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DROP                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DROP                 " "firewall-cmd.at:71"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:72: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT                 " "firewall-cmd.at:72"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:73: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --get-target | grep ACCEPT                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:73"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --get-target | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:74: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --add-service=ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --add-service=ssh                 " "firewall-cmd.at:74"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --add-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:77: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-zone=123456789abcefghi                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-zone=123456789abcefghi                 " "firewall-cmd.at:77"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-zone=123456789abcefghi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:78: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-zone=123456789abcefghij                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-zone=123456789abcefghij                 " "firewall-cmd.at:78"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-zone=123456789abcefghij
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 116 $at_status "$at_srcdir/firewall-cmd.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_4
#AT_START_5
at_fn_group_banner 5 'firewall-cmd.at:82' \
  "zone interfaces" "                                " 1
at_xfail=no
(
  $as_echo "5. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:82: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:82"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:82: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:82"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi










































































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:114: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --get-default-zone" "firewall-cmd.at:114"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:115: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --set-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --set-default-zone" "firewall-cmd.at:115"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:118: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --add-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --add-interface=perm_dummy                 " "firewall-cmd.at:118"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:119: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --add-interface=perm_dummy2                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --add-interface=perm_dummy2                 " "firewall-cmd.at:119"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --add-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }
















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:121: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 " "firewall-cmd.at:121"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:121"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:123: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-interface=perm_dummy                 " "firewall-cmd.at:123"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:124: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --list-interfaces                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --list-interfaces                 " "firewall-cmd.at:124"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "perm_dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:130: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy                 " "firewall-cmd.at:130"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:130"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:131: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 " "firewall-cmd.at:131"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:131"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:133: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy                 " "firewall-cmd.at:133"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:134: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy                 " "firewall-cmd.at:134"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:135: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy                 " "firewall-cmd.at:135"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:136: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 " "firewall-cmd.at:136"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:136"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:138: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy                 " "firewall-cmd.at:138"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:139: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy                 " "firewall-cmd.at:139"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:140: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --remove-interface=perm_dummy2                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --remove-interface=perm_dummy2                 " "firewall-cmd.at:140"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --remove-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }








































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:165: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-interface=foobar+                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-interface=foobar+                 " "firewall-cmd.at:165"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:165"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:166: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-interface=foobar+                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-interface=foobar+                 " "firewall-cmd.at:166"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }



































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_5
#AT_START_6
at_fn_group_banner 6 'firewall-cmd.at:170' \
  "zone sources" "                                   " 1
at_xfail=no
(
  $as_echo "6. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:170: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:170"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:170: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:170"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi



















































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=1.2.3.4                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=1.2.3.4                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=1.2.3.4                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=1.2.3.4                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=1.2.3.4                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }

















































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=192.168.1.0/24                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=192.168.1.0/24                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=192.168.1.0/24                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=192.168.1.0/24                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=192.168.1.0/24                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }

















































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=192.168.1.1/255.255.255.0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=192.168.1.1/255.255.255.0                 " "firewall-cmd.at:213"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.1/255.255.255.0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.1/255.255.255.0                 " "firewall-cmd.at:213"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 " "firewall-cmd.at:213"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.1/255.255.255.0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:213"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.1/255.255.255.0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=192.168.1.1/255.255.255.0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=192.168.1.1/255.255.255.0                 " "firewall-cmd.at:213"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=192.168.1.1/255.255.255.0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=192.168.1.1/255.255.255.0                 " "firewall-cmd.at:213"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.1/255.255.255.0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.1/255.255.255.0                 " "firewall-cmd.at:213"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=192.168.1.1/255.255.255.0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=192.168.1.1/255.255.255.0                 " "firewall-cmd.at:213"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=192.168.1.1/255.255.255.0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=192.168.1.1/255.255.255.0                 " "firewall-cmd.at:213"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }



















































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 " "firewall-cmd.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }

















































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=dead:beef::babe                 " "firewall-cmd.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe                 " "firewall-cmd.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 " "firewall-cmd.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=dead:beef::babe                 " "firewall-cmd.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=dead:beef::babe                 " "firewall-cmd.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe                 " "firewall-cmd.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=dead:beef::babe                 " "firewall-cmd.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=dead:beef::babe                 " "firewall-cmd.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }













      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_6
#AT_START_7
at_fn_group_banner 7 'firewall-cmd.at:223' \
  "services" "                                       " 1
at_xfail=no
(
  $as_echo "7. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:223: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:223"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:223: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:223"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


























































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:235: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service dns                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service dns                 " "firewall-cmd.at:235"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:235"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:236: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --list-services                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --list-services                 " "firewall-cmd.at:236"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dns ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:238: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service dns                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service dns                 " "firewall-cmd.at:238"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:238"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:239: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-service-from-zone=dns                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-service-from-zone=dns                 " "firewall-cmd.at:239"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-service-from-zone=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:244: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service=dns                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service=dns                 " "firewall-cmd.at:244"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:245: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=smtpssssssss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=smtpssssssss                 " "firewall-cmd.at:245"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:246: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=dns --add-interface=dummy0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=dns --add-interface=dummy0                 " "firewall-cmd.at:246"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }



































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:255: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-service=http --add-service=nfs                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-service=http --add-service=nfs                 " "firewall-cmd.at:255"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-service=http --add-service=nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:256: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service http                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service http                 " "firewall-cmd.at:256"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:257: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service=nfs --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service=nfs --zone=public                 " "firewall-cmd.at:257"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:257"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:258: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-service-from-zone=nfs --remove-service-from-zone=http                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-service-from-zone=nfs --remove-service-from-zone=http                 " "firewall-cmd.at:258"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-service-from-zone=nfs --remove-service-from-zone=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:258"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:263: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service http                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service http                 " "firewall-cmd.at:263"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:263"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:264: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service nfs                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service nfs                 " "firewall-cmd.at:264"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:264"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_7
#AT_START_8
at_fn_group_banner 8 'firewall-cmd.at:267' \
  "user services" "                                  " 1
at_xfail=no
(
  $as_echo "8. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:267: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:267"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:267: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:267"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=ssh                 " "firewall-cmd.at:270"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:272: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=foobar                 " "firewall-cmd.at:272"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:272"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:273: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:273"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:275: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666                 " "firewall-cmd.at:275"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:275"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:276: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/dummy                 " "firewall-cmd.at:276"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:277: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/tcp                 " "firewall-cmd.at:277"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:278: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/tcp                 " "firewall-cmd.at:278"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:279: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=111-222/udp                 " "firewall-cmd.at:279"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:280: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp                 " "firewall-cmd.at:280"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:281: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 111-222/udp                 " "firewall-cmd.at:281"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:281"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:282: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp                 " "firewall-cmd.at:282"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:283: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp                 " "firewall-cmd.at:283"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:283"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:284: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/sctp                 " "firewall-cmd.at:284"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:285: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 666/sctp                 " "firewall-cmd.at:285"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:285"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:286: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=666/sctp                 " "firewall-cmd.at:286"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:287: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp                 " "firewall-cmd.at:287"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:287"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:288: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=999/dccp                 " "firewall-cmd.at:288"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:289: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 999/dccp                 " "firewall-cmd.at:289"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:289"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:290: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=999/dccp                 " "firewall-cmd.at:290"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:291: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp                 " "firewall-cmd.at:291"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:291"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:292: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp                 " "firewall-cmd.at:292"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:294: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-protocol=ddp --add-protocol gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-protocol=ddp --add-protocol gre                 " "firewall-cmd.at:294"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:295: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp                 " "firewall-cmd.at:295"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:296: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre                 " "firewall-cmd.at:296"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:296"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:297: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol ddp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol ddp                 " "firewall-cmd.at:297"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:297"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:298: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol gre                 " "firewall-cmd.at:298"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:298"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:299: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp                 " "firewall-cmd.at:299"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:300: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre                 " "firewall-cmd.at:300"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:302: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=sip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=sip                 " "firewall-cmd.at:302"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:302"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:303: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=sip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=sip                 " "firewall-cmd.at:303"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:303"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:304: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=ftp                 " "firewall-cmd.at:304"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:304"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:305: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp                 " "firewall-cmd.at:305"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:305"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:306: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=ftp                 " "firewall-cmd.at:306"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:306"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:307: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp                 " "firewall-cmd.at:307"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:309: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-helper=sip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-helper=sip                 " "firewall-cmd.at:309"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-helper=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:309"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:310: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-helper=sip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-helper=sip                 " "firewall-cmd.at:310"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-helper=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:310"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-helper=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-helper=ftp                 " "firewall-cmd.at:311"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:312: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-helper=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-helper=ftp                 " "firewall-cmd.at:312"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:312"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:313: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --get-service-helpers                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --get-service-helpers                 " "firewall-cmd.at:313"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --get-service-helpers
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:313"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:316: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-helper=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-helper=ftp                 " "firewall-cmd.at:316"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:316"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:317: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-helper=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-helper=ftp                 " "firewall-cmd.at:317"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:317"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:319: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4                 " "firewall-cmd.at:319"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/firewall-cmd.at:319"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:320: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:foo                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:foo                 " "firewall-cmd.at:320"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:320"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:321: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:1.2.3.4                 " "firewall-cmd.at:321"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:321"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:322: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv4                 " "firewall-cmd.at:322"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:322"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64                 " "firewall-cmd.at:323"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64                 " "firewall-cmd.at:323"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv6                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv6                 " "firewall-cmd.at:323"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64                 " "firewall-cmd.at:323"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }























    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:330: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-service=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-service=foobar                 " "firewall-cmd.at:330"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:330"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:331: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-services | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:331"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:331"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:332: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-service=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-service=foobar                 " "firewall-cmd.at:332"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:332"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:333: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-services | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:333"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:333"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./foobar-to-be-renamed <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="icmp" />
<port protocol="tcp" port="1234" />
</service>
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:335: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service-from-file=\"./foobar-to-be-renamed\" --name=\"foobar-from-file\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service-from-file=\"./foobar-to-be-renamed\" --name=\"foobar-from-file\"                 " "firewall-cmd.at:335"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service-from-file="./foobar-to-be-renamed" --name="foobar-from-file"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:335"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:335: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services | grep foobar-from-file                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:335"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services | grep foobar-from-file
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:335"
$at_failed && at_fn_log_failure
$at_traceon; }





_ATEOF




      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_8
#AT_START_9
at_fn_group_banner 9 'firewall-cmd.at:349' \
  "ports" "                                          " 1
at_xfail=no
(
  $as_echo "9. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:349: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:349"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:349: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:349"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi












































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:373: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666                 " "firewall-cmd.at:373"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:373"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:374: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/dummy                 " "firewall-cmd.at:374"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:374"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:375: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/tcp                 " "firewall-cmd.at:375"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:376: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port=666/tcp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port=666/tcp --zone=public                 " "firewall-cmd.at:376"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:377: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=111-222/udp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=111-222/udp --zone=public                 " "firewall-cmd.at:377"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:377"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:378: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp                 " "firewall-cmd.at:378"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:378"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:379: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 111-222/udp                 " "firewall-cmd.at:379"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:379"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:380: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp                 " "firewall-cmd.at:380"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:380"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:382: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=5000/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=5000/sctp                 " "firewall-cmd.at:382"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:382"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:383: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp --zone=public                 " "firewall-cmd.at:383"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:383"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:384: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 5000/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 5000/sctp                 " "firewall-cmd.at:384"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:384"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:385: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp                 " "firewall-cmd.at:385"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:385"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:386: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=222/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=222/dccp                 " "firewall-cmd.at:386"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:386"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:387: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp --zone=public                 " "firewall-cmd.at:387"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:387"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:388: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 222/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 222/dccp                 " "firewall-cmd.at:388"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:388"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:389: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp                 " "firewall-cmd.at:389"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:389"
$at_failed && at_fn_log_failure
$at_traceon; }




































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:398: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=80/tcp --add-port 443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=80/tcp --add-port 443-444/udp                 " "firewall-cmd.at:398"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:398"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:399: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp --zone=public                 " "firewall-cmd.at:399"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:399"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:400: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp                 " "firewall-cmd.at:400"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:400"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:401: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 80/tcp --remove-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 80/tcp --remove-port=443-444/udp                 " "firewall-cmd.at:401"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:401"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:402: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp                 " "firewall-cmd.at:402"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:402"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:403: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp                 " "firewall-cmd.at:403"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:403"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_9
#AT_START_10
at_fn_group_banner 10 'firewall-cmd.at:406' \
  "source ports" "                                   " 1
at_xfail=no
(
  $as_echo "10. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:406: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:406"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:406: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:406"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi









































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:419: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666                 " "firewall-cmd.at:419"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:419"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:420: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/dummy                 " "firewall-cmd.at:420"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:420"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:421: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/tcp                 " "firewall-cmd.at:421"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:421"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:422: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port=666/tcp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port=666/tcp --zone=public                 " "firewall-cmd.at:422"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:422"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:423: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=111-222/udp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=111-222/udp --zone=public                 " "firewall-cmd.at:423"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:423"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:424: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp                 " "firewall-cmd.at:424"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:424"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:425: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 111-222/udp                 " "firewall-cmd.at:425"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:425"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:426: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp                 " "firewall-cmd.at:426"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:426"
$at_failed && at_fn_log_failure
$at_traceon; }




































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:435: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=80/tcp --add-source-port 443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=80/tcp --add-source-port 443-444/udp                 " "firewall-cmd.at:435"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:435"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:436: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp --zone=public                 " "firewall-cmd.at:436"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:436"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:437: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp                 " "firewall-cmd.at:437"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:437"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:438: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 80/tcp --remove-source-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 80/tcp --remove-source-port=443-444/udp                 " "firewall-cmd.at:438"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:438"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:439: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp                 " "firewall-cmd.at:439"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:439"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:440: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp                 " "firewall-cmd.at:440"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:440"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_10
#AT_START_11
at_fn_group_banner 11 'firewall-cmd.at:443' \
  "protocols" "                                      " 1
at_xfail=no
(
  $as_echo "11. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:443"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:443"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:451: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dummy                 " "firewall-cmd.at:451"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:451"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:452: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dccp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dccp --zone=public                 " "firewall-cmd.at:452"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:452"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:453: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp                 " "firewall-cmd.at:453"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:453"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:454: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol dccp                 " "firewall-cmd.at:454"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:454"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:455: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp                 " "firewall-cmd.at:455"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:455"
$at_failed && at_fn_log_failure
$at_traceon; }



































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:463: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=ddp --add-protocol gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=ddp --add-protocol gre                 " "firewall-cmd.at:463"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:463"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:464: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp --zone=public                 " "firewall-cmd.at:464"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:464"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:465: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre                 " "firewall-cmd.at:465"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:465"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:466: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol ddp --remove-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol ddp --remove-protocol=gre                 " "firewall-cmd.at:466"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:466"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:467: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp                 " "firewall-cmd.at:467"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:467"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:468: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre                 " "firewall-cmd.at:468"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:468"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_11
#AT_START_12
at_fn_group_banner 12 'firewall-cmd.at:471' \
  "masquerade" "                                     " 1
at_xfail=no
(
  $as_echo "12. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:471: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:471"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:471: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:471"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi



















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:492: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-masquerade --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-masquerade --zone=public                 " "firewall-cmd.at:492"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:493: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade                 " "firewall-cmd.at:493"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:493"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:494: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-masquerade                 " "firewall-cmd.at:494"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:494"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:495: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade                 " "firewall-cmd.at:495"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:495"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_12
#AT_START_13
at_fn_group_banner 13 'firewall-cmd.at:498' \
  "forward" "                                        " 1
at_xfail=no
(
  $as_echo "13. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:498"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:498"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:571: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --add-forward                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --add-forward                 " "firewall-cmd.at:571"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:571"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:572: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --add-interface=dummy --add-interface=dummy3                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --add-interface=dummy --add-interface=dummy3                 " "firewall-cmd.at:572"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --add-interface=dummy --add-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:572"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:573: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --add-source=10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --add-source=10.10.10.0/24                 " "firewall-cmd.at:573"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:573"
$at_failed && at_fn_log_failure
$at_traceon; }
















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:575: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --query-forward                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --query-forward                 " "firewall-cmd.at:575"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:575"
$at_failed && at_fn_log_failure
$at_traceon; }





























    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:594: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --remove-forward                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --remove-forward                 " "firewall-cmd.at:594"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:594"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:595: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --query-forward                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --query-forward                 " "firewall-cmd.at:595"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:595"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:596: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --remove-interface=dummy --remove-interface=dummy3                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --remove-interface=dummy --remove-interface=dummy3                 " "firewall-cmd.at:596"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --remove-interface=dummy --remove-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:596"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:597: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --remove-source=10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --remove-source=10.10.10.0/24                 " "firewall-cmd.at:597"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:597"
$at_failed && at_fn_log_failure
$at_traceon; }


















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:601: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone |grep public"
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:601"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone |grep public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }






















































































































































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_13
#AT_START_14
at_fn_group_banner 14 'firewall-cmd.at:686' \
  "forward ports" "                                  " 1
at_xfail=no
(
  $as_echo "14. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:686: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:686"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:686"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:686: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:686"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:686"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi

























































































































































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=666                 " "firewall-cmd.at:756"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:757: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=11:proto=tcp:toport=22                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=11:proto=tcp:toport=22                 " "firewall-cmd.at:757"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:757"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:758: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public                 " "firewall-cmd.at:758"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:758"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4444                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4444                 " "firewall-cmd.at:759"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:760: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public                 " "firewall-cmd.at:760"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:760"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:761: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4                 " "firewall-cmd.at:761"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:761"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:762: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:762"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:762"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:763: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public                 " "firewall-cmd.at:763"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:763"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:764: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:764"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:764"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:765: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:765"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:765"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:766: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:766"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:766"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:767: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public                 " "firewall-cmd.at:767"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:767"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:768: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:768"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:768"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:769: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:769"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:769"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 " "firewall-cmd.at:770"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public                 " "firewall-cmd.at:770"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 " "firewall-cmd.at:770"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 " "firewall-cmd.at:770"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:776: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200                 " "firewall-cmd.at:776"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:776"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:777: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=100:proto=tcp:toport=200                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=100:proto=tcp:toport=200                 " "firewall-cmd.at:777"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:777"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:778: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99 --zone=public                 " "firewall-cmd.at:778"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:778"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:779: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99                 " "firewall-cmd.at:779"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:779"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=100:proto=tcp:toport=200                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=100:proto=tcp:toport=200                 " "firewall-cmd.at:780"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:781: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99                 " "firewall-cmd.at:781"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:781"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:782: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-forward-ports                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-forward-ports                 " "firewall-cmd.at:782"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:782"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_14
#AT_START_15
at_fn_group_banner 15 'firewall-cmd.at:785' \
  "ICMP block" "                                     " 1
at_xfail=no
(
  $as_echo "15. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:785"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:785"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:795: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=dummyblock                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=dummyblock                 " "firewall-cmd.at:795"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:795"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:796: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=redirect                 " "firewall-cmd.at:796"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:796"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:797: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect                 " "firewall-cmd.at:797"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:797"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:798: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block redirect                 " "firewall-cmd.at:798"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:798"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:799: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect                 " "firewall-cmd.at:799"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:799"
$at_failed && at_fn_log_failure
$at_traceon; }









































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:805: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-icmp-block-inversion --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-icmp-block-inversion --zone=public                 " "firewall-cmd.at:805"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:805"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:806: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion                 " "firewall-cmd.at:806"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:806"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:807: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-icmp-block-inversion                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-icmp-block-inversion                 " "firewall-cmd.at:807"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:807"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:808: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion                 " "firewall-cmd.at:808"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:808"
$at_failed && at_fn_log_failure
$at_traceon; }


















































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:823: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation                 " "firewall-cmd.at:823"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:823"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:824: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply                 " "firewall-cmd.at:824"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:824"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:825: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation                 " "firewall-cmd.at:825"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:825"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:826: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation                 " "firewall-cmd.at:826"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:826"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:827: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply                 " "firewall-cmd.at:827"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:827"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:828: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation                 " "firewall-cmd.at:828"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:828"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_15
#AT_START_16
at_fn_group_banner 16 'firewall-cmd.at:831' \
  "user ICMP types" "                                " 1
at_xfail=no
(
  $as_echo "16. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:831"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:831"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:834: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=redirect                 " "firewall-cmd.at:834"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:834"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:836: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=foobar                 " "firewall-cmd.at:836"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:836"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:837: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:837"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:837"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:839: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv5                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv5                 " "firewall-cmd.at:839"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:839"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:840: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4                 " "firewall-cmd.at:840"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:840"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:841: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4                 " "firewall-cmd.at:841"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:841"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:842: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4                 " "firewall-cmd.at:842"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:842"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:843: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4                 " "firewall-cmd.at:843"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:843"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:844: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4                 " "firewall-cmd.at:844"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:844"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:845: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4                 " "firewall-cmd.at:845"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:845"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:847: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-icmp-block=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-icmp-block=foobar                 " "firewall-cmd.at:847"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-icmp-block=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:847"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:848: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-icmp-blocks | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:848"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:848"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:850: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-icmptype=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-icmptype=foobar                 " "firewall-cmd.at:850"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:850"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:851: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-icmp-blocks | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:851"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:851"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_16
#AT_START_17
at_fn_group_banner 17 'firewall-cmd.at:854' \
  "ipset" "                                          " 1
at_xfail=no
(
  $as_echo "17. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:854"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:854"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




























    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:860: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip                 " "firewall-cmd.at:860"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:860"
$at_failed && at_fn_log_failure
$at_traceon; }































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:878: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:878"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:878"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:882: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port                 " "firewall-cmd.at:882"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:882"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:883: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10-10.10.10.12,1234                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10-10.10.10.12,1234                 " "firewall-cmd.at:883"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10-10.10.10.12,1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:883"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:884: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,2000-2100                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,2000-2100                 " "firewall-cmd.at:884"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,2000-2100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:884"
$at_failed && at_fn_log_failure
$at_traceon; }
































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:897: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:897"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:897"
$at_failed && at_fn_log_failure
$at_traceon; }

















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:901: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port                 " "firewall-cmd.at:901"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:901"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:902: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,sctp:1234                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,sctp:1234                 " "firewall-cmd.at:902"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,sctp:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:902"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:903: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,udp:1000-1002                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,udp:1000-1002                 " "firewall-cmd.at:903"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,udp:1000-1002
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:903"
$at_failed && at_fn_log_failure
$at_traceon; }
































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:941: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:941"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:941"
$at_failed && at_fn_log_failure
$at_traceon; }

















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:945: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,mark                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,mark                 " "firewall-cmd.at:945"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,mark
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:945"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:946: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,0x100                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,0x100                 " "firewall-cmd.at:946"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,0x100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:946"
$at_failed && at_fn_log_failure
$at_traceon; }



















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:979: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:979"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:979"
$at_failed && at_fn_log_failure
$at_traceon; }

















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:983: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:net,port                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:net,port                 " "firewall-cmd.at:983"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:net,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:983"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:984: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.0/24,sctp:1234                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.0/24,sctp:1234                 " "firewall-cmd.at:984"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.0/24,sctp:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:984"
$at_failed && at_fn_log_failure
$at_traceon; }





























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:987: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:987"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:987"
$at_failed && at_fn_log_failure
$at_traceon; }

















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:991: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port,net                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port,net                 " "firewall-cmd.at:991"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port,net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:991"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:992: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,sctp:1234,10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,sctp:1234,10.10.10.0/24                 " "firewall-cmd.at:992"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,sctp:1234,10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:992"
$at_failed && at_fn_log_failure
$at_traceon; }



































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:1012"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }

















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1016: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:net,iface                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:net,iface                 " "firewall-cmd.at:1016"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:net,iface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1016"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1017: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.0/24,foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.0/24,foobar0                 " "firewall-cmd.at:1017"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.0/24,foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1017"
$at_failed && at_fn_log_failure
$at_traceon; }



















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1050: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:1050"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1050"
$at_failed && at_fn_log_failure
$at_traceon; }



















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:mac                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:mac                 " "firewall-cmd.at:1053"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:mac
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=12:34:56:78:90:ab                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=12:34:56:78:90:ab                 " "firewall-cmd.at:1053"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=12:34:56:78:90:ab
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }





























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:1053"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }





































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_17
#AT_START_18
at_fn_group_banner 18 'firewall-cmd.at:1063' \
  "user helpers" "                                   " 1
at_xfail=no
(
  $as_echo "18. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1063: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1063"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1063"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1063: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1063"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1063"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1066: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=foo                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=foo                 " "firewall-cmd.at:1066"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 132 $at_status "$at_srcdir/firewall-cmd.at:1066"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1067: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=nf_conntrack_foo                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=nf_conntrack_foo                 " "firewall-cmd.at:1067"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=nf_conntrack_foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1067"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1068: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-helpers | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1068"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1068"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1069: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family | grep ipv4                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1069"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1069"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1070: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv5                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv5                 " "firewall-cmd.at:1070"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1070"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1071: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv4                 " "firewall-cmd.at:1071"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1071"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1072: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family | grep ipv4                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1072"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1072"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1073: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=                 " "firewall-cmd.at:1073"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1073"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1075: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family                 " "firewall-cmd.at:1075"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1075"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1077: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports                 " "firewall-cmd.at:1077"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1077"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1080: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --add-port=44/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --add-port=44/tcp                 " "firewall-cmd.at:1080"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --add-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1080"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1081: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports | grep 44                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1081"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports | grep 44
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1081"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1082: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp                 " "firewall-cmd.at:1082"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1083: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --remove-port=44/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --remove-port=44/tcp                 " "firewall-cmd.at:1083"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --remove-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1083"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1084: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp                 " "firewall-cmd.at:1084"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1084"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1085: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports                 " "firewall-cmd.at:1085"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1085"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1087: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-helper=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-helper=foobar                 " "firewall-cmd.at:1087"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-helper=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1087"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1088: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-helpers | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1088"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1088"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_18
#AT_START_19
at_fn_group_banner 19 'firewall-cmd.at:1091' \
  "direct" "                                         " 1
at_xfail=no
(
  $as_echo "19. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1091: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1091"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1091"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1091: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1091"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1091"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




































































































































































































































































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1135: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --direct --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --direct --get-default-zone" "firewall-cmd.at:1135"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --direct --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1135"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1137: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      --direct                       --list-all                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      --direct                       --list-all                 " "firewall-cmd.at:1137"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      --direct                       --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1137"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1140: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain ipv4 filter žluťoučký                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain ipv4 filter žluťoučký                 " "firewall-cmd.at:1140"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1140"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1141: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-chains ipv4 filter |grep \"žluťoučký\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1141"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-chains ipv4 filter |grep "žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1141"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1142: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-chains | grep \"ipv4 filter žluťoučký\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1142"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-chains | grep "ipv4 filter žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1142"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1143: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký                 " "firewall-cmd.at:1143"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1143"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1144: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT                 " "firewall-cmd.at:1144"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1144"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1145: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1145"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1145"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1146: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep \"ipv4 filter žluťoučký 3 -j ACCEPT\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1146"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep "ipv4 filter žluťoučký 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1146"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1147: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT                 " "firewall-cmd.at:1147"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1147"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1148: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT                 " "firewall-cmd.at:1148"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1148"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1149: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT                 " "firewall-cmd.at:1149"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1149"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1150: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-chain ipv4 filter žluťoučký                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-chain ipv4 filter žluťoučký                 " "firewall-cmd.at:1150"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1150"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1151: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký                 " "firewall-cmd.at:1151"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1151"
$at_failed && at_fn_log_failure
$at_traceon; }



































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1160: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT                 " "firewall-cmd.at:1160"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1160"
$at_failed && at_fn_log_failure
$at_traceon; }



































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_19
#AT_START_20
at_fn_group_banner 20 'firewall-cmd.at:1165' \
  "direct nat" "                                     " 1
at_xfail=no
(
  $as_echo "20. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1165: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1165"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1165"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1165: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1165"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1165"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






























    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1173: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81                 " "firewall-cmd.at:1173"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1173"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1174: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1174"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1174"
$at_failed && at_fn_log_failure
$at_traceon; }














































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1177: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81                 " "firewall-cmd.at:1177"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1177"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1178: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82                 " "firewall-cmd.at:1178"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1178"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1179: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1179"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1179"
$at_failed && at_fn_log_failure
$at_traceon; }



























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1183: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82                 " "firewall-cmd.at:1183"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1183"
$at_failed && at_fn_log_failure
$at_traceon; }



































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_20
#AT_START_21
at_fn_group_banner 21 'firewall-cmd.at:1190' \
  "direct passthrough" "                             " 1
at_xfail=no
(
  $as_echo "21. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1190: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1190"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1190"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1190: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1190"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1190"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi

































































































































    if $IP6TABLES -L >/dev/null 2>&1; then
        :



































































    else
        :

    fi


























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1218: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4                 " "firewall-cmd.at:1218"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1218"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1219: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv5 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv5 -nvL                 " "firewall-cmd.at:1219"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1219"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1220: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4 -nvL                 " "firewall-cmd.at:1220"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1220"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1221: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-passthroughs ipv4 | grep \"[-]nvL\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1221"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-passthroughs ipv4 | grep "[-]nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1221"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1222: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-passthroughs | grep \"ipv4 [-]nvL\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1222"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-passthroughs | grep "ipv4 [-]nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1222"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1223: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL                 " "firewall-cmd.at:1223"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1223"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1224: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-passthrough ipv4 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-passthrough ipv4 -nvL                 " "firewall-cmd.at:1224"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1224"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1225: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL                 " "firewall-cmd.at:1225"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1225"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_21
#AT_START_22
at_fn_group_banner 22 'firewall-cmd.at:1228' \
  "direct ebtables" "                                " 1
at_xfail=no
(
  $as_echo "22. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1228: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1228"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1228"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1228: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1228"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1228"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


























































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1264: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain eb filter mychain                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain eb filter mychain                 " "firewall-cmd.at:1264"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1264"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1265: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-chains eb filter | grep mychain                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1265"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1265"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1266: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP                 " "firewall-cmd.at:1266"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1266"
$at_failed && at_fn_log_failure
$at_traceon; }






































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_22
#AT_START_23
at_fn_group_banner 23 'firewall-cmd.at:1274' \
  "lockdown" "                                       " 1
at_xfail=no
(
  $as_echo "23. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1274: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1274"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1274"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1274: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1274"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1274"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1282: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-command /usr/bin/command                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-command /usr/bin/command                 " "firewall-cmd.at:1282"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1282"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1283: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command                 " "firewall-cmd.at:1283"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1283"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1284: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-commands | grep \"/usr/bin/command\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1284"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1284"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1285: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-command /usr/bin/command                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-command /usr/bin/command                 " "firewall-cmd.at:1285"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1285"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1286: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command                 " "firewall-cmd.at:1286"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1286"
$at_failed && at_fn_log_failure
$at_traceon; }






















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1293: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 " "firewall-cmd.at:1293"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1293"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1294: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 " "firewall-cmd.at:1294"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1294"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1295: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1295"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1295"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1296: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 " "firewall-cmd.at:1296"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1296"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1297: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 " "firewall-cmd.at:1297"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1297"
$at_failed && at_fn_log_failure
$at_traceon; }



































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1305: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666                 " "firewall-cmd.at:1305"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1305"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1306: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666                 " "firewall-cmd.at:1306"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1306"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1307: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-uids | grep \"6666\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1307"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1307"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1308: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-uid 6666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-uid 6666                 " "firewall-cmd.at:1308"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1308"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1309: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666                 " "firewall-cmd.at:1309"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1309"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1310: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666x                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666x                 " "firewall-cmd.at:1310"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1310"
$at_failed && at_fn_log_failure
$at_traceon; }






















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1317: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-user theboss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-user theboss                 " "firewall-cmd.at:1317"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1317"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1318: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss                 " "firewall-cmd.at:1318"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1318"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1319: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-users | grep \"theboss\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1319"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1319"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1320: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-user theboss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-user theboss                 " "firewall-cmd.at:1320"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1320"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1321: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss                 " "firewall-cmd.at:1321"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1321"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "firewall-cmd.at:1323" >"$at_check_line_file"
(test `whoami` != 'root') \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1323"



































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_23
#AT_START_24
at_fn_group_banner 24 'firewall-cmd.at:1341' \
  "rich rules good" "                                " 1
at_xfail=no
(
  $as_echo "24. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1341: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1341"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1341"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1341: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1341"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1341"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" reject'                 " "firewall-cmd.at:1344"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"ah\" reject'                 " "firewall-cmd.at:1344"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"ah\" reject'                 " "firewall-cmd.at:1344"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"ah\" reject'                 " "firewall-cmd.at:1344"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"esp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"esp\" accept'                 " "firewall-cmd.at:1345"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"esp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"esp\" accept'                 " "firewall-cmd.at:1345"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"esp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"esp\" accept'                 " "firewall-cmd.at:1345"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"esp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"esp\" accept'                 " "firewall-cmd.at:1345"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"sctp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"sctp\" log'                 " "firewall-cmd.at:1346"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"sctp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"sctp\" log'                 " "firewall-cmd.at:1346"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"sctp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"sctp\" log'                 " "firewall-cmd.at:1346"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"sctp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"sctp\" log'                 " "firewall-cmd.at:1346"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"igmp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"igmp\" log'                 " "firewall-cmd.at:1347"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"igmp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"igmp\" log'                 " "firewall-cmd.at:1347"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"igmp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"igmp\" log'                 " "firewall-cmd.at:1347"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"igmp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"igmp\" log'                 " "firewall-cmd.at:1347"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 " "firewall-cmd.at:1348"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 " "firewall-cmd.at:1348"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 " "firewall-cmd.at:1348"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 " "firewall-cmd.at:1348"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 " "firewall-cmd.at:1349"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 " "firewall-cmd.at:1349"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 " "firewall-cmd.at:1349"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 " "firewall-cmd.at:1349"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept'                 " "firewall-cmd.at:1350"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept'                 " "firewall-cmd.at:1350"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept'                 " "firewall-cmd.at:1350"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept'                 " "firewall-cmd.at:1350"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop'                 " "firewall-cmd.at:1351"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop'                 " "firewall-cmd.at:1351"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop'                 " "firewall-cmd.at:1351"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop'                 " "firewall-cmd.at:1351"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop'                 " "firewall-cmd.at:1352"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop'                 " "firewall-cmd.at:1352"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop'                 " "firewall-cmd.at:1352"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop'                 " "firewall-cmd.at:1352"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept'                 " "firewall-cmd.at:1353"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept'                 " "firewall-cmd.at:1353"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept'                 " "firewall-cmd.at:1353"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept'                 " "firewall-cmd.at:1353"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }












































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" masquerade'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" masquerade'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" masquerade'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" masquerade'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }












































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 " "firewall-cmd.at:1362"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 " "firewall-cmd.at:1362"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 " "firewall-cmd.at:1362"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 " "firewall-cmd.at:1362"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1363"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1363"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1363"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1363"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1364"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1364"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1364"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1364"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 " "firewall-cmd.at:1365"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 " "firewall-cmd.at:1365"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 " "firewall-cmd.at:1365"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 " "firewall-cmd.at:1365"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1366"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1366"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1366"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1366"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1367"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1367"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1367"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1367"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1368"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1368"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1368"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1368"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }












































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1369"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1369"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1369"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1369"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1369"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1369"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1369"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1369"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }












































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 " "firewall-cmd.at:1373"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 " "firewall-cmd.at:1373"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 " "firewall-cmd.at:1373"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 " "firewall-cmd.at:1373"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_24
#AT_START_25
at_fn_group_banner 25 'firewall-cmd.at:1375' \
  "rich rules audit" "                               " 1
at_xfail=no
(
  $as_echo "25. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1375: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1375"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1375"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1375: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1375"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1375"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi













































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 " "firewall-cmd.at:1379"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 " "firewall-cmd.at:1379"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 " "firewall-cmd.at:1379"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 " "firewall-cmd.at:1379"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_25
#AT_START_26
at_fn_group_banner 26 'firewall-cmd.at:1383' \
  "rich rules priority" "                            " 1
at_xfail=no
(
  $as_echo "26. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1383: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1383"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1383"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1383: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1383"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1383"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















































































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1534: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule priority=127 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule priority=127 drop'                 " "firewall-cmd.at:1534"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1534"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1535: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'                 " "firewall-cmd.at:1535"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1535"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1536: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule priority=127 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule priority=127 drop'                 " "firewall-cmd.at:1536"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1536"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1537: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'                 " "firewall-cmd.at:1537"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1537"
$at_failed && at_fn_log_failure
$at_traceon; }























































































































































































































































































































































































































































































































































































































































































































































































































































































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_26
#AT_START_27
at_fn_group_banner 27 'firewall-cmd.at:1938' \
  "rich rules bad" "                                 " 1
at_xfail=no
(
  $as_echo "27. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1938: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1938"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1938"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1938: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1938"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1938"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1945: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule=''                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule=''                 " "firewall-cmd.at:1945"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1945"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1946: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='name=\"dns\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='name=\"dns\" accept'                 " "firewall-cmd.at:1946"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1946"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1947: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='protocol value=\"ah\" reject'                 " "firewall-cmd.at:1947"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1947"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1948: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"'                 " "firewall-cmd.at:1948"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1948"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1949: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"'                 " "firewall-cmd.at:1949"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1949"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1950: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule'                 " "firewall-cmd.at:1950"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1950"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1951: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule bad_element'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule bad_element'                 " "firewall-cmd.at:1951"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1951"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1952: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv5\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv5\"'                 " "firewall-cmd.at:1952"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1952"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1953: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule name=\"dns\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule name=\"dns\" accept'                 " "firewall-cmd.at:1953"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1953"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1954: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol=\"ah\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol=\"ah\" accept'                 " "firewall-cmd.at:1954"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1954"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1955: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" accept drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" accept drop'                 " "firewall-cmd.at:1955"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1955"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1956: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject'                 " "firewall-cmd.at:1956"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1956"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1957: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service bad_attribute=\"dns\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service bad_attribute=\"dns\"'                 " "firewall-cmd.at:1957"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1957"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1958: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"'                 " "firewall-cmd.at:1958"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1958"
$at_failed && at_fn_log_failure
$at_traceon; }




































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='family=\"ipv6\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='family=\"ipv6\" accept'                 " "firewall-cmd.at:1959"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='family="ipv6" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"'                 " "firewall-cmd.at:1959"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 207 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"'                 " "firewall-cmd.at:1959"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 123 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }




































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1964: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"esp\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"esp\"'                 " "firewall-cmd.at:1964"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1964"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1965: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" masquerade drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" masquerade drop'                 " "firewall-cmd.at:1965"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1965"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1966: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept'                 " "firewall-cmd.at:1966"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1966"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1967: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept'                 " "firewall-cmd.at:1967"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1967"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1968: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name=\"ssh\" log prefix=\"RRClag4hrBx9XZXk+46c6QavQehyRGdy3tjs7gzc+xfSzsd2smjoQ2NCPami6zVyjHtPGziBuqSWT0KII7QbHkwjNMr9pzbcbPue9PMTb5zXlMPphDjeuDdC3QTCH9rGQHooa9LiDWr+DqNPkBs+vb8r50eb+yEQIyhQaiDrQ0sc\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name=\"ssh\" log prefix=\"RRClag4hrBx9XZXk+46c6QavQehyRGdy3tjs7gzc+xfSzsd2smjoQ2NCPami6zVyjHtPGziBuqSWT0KII7QbHkwjNMr9pzbcbPue9PMTb5zXlMPphDjeuDdC3QTCH9rGQHooa9LiDWr+DqNPkBs+vb8r50eb+yEQIyhQaiDrQ0sc\" drop'                 " "firewall-cmd.at:1968"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name="ssh" log prefix="RRClag4hrBx9XZXk+46c6QavQehyRGdy3tjs7gzc+xfSzsd2smjoQ2NCPami6zVyjHtPGziBuqSWT0KII7QbHkwjNMr9pzbcbPue9PMTb5zXlMPphDjeuDdC3QTCH9rGQHooa9LiDWr+DqNPkBs+vb8r50eb+yEQIyhQaiDrQ0sc" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 141 $at_status "$at_srcdir/firewall-cmd.at:1968"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1969: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"sctp\" nflog group=-1 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"sctp\" nflog group=-1 drop'                 " "firewall-cmd.at:1969"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="sctp" nflog group=-1 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 142 $at_status "$at_srcdir/firewall-cmd.at:1969"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1970: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" service name=\"https\" nflog queue-size=-1 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" service name=\"https\" nflog queue-size=-1 drop'                 " "firewall-cmd.at:1970"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" service name="https" nflog queue-size=-1 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 143 $at_status "$at_srcdir/firewall-cmd.at:1970"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1971: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" service name=\"https\" nflog queue-size=65536 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" service name=\"https\" nflog queue-size=65536 drop'                 " "firewall-cmd.at:1971"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" service name="https" nflog queue-size=65536 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 143 $at_status "$at_srcdir/firewall-cmd.at:1971"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_27
#AT_START_28
at_fn_group_banner 28 'firewall-cmd.at:1981' \
  "config validation" "                              " 1
at_xfail=no
(
  $as_echo "28. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1981: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1981"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1981"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1981: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1981"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1981"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1985: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1985"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1985"
$at_failed && at_fn_log_failure
$at_traceon; }






        cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<rule ipv="ipv4" table="filter" chain="INPUT" priority="1">-j LOG</rule>
</direct>
_ATEOF

    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
<command name="/home/egarver/bin/python /usr/bin/firewall-config"/>
<selinux context="system_u:system_r:NetworkManager_t:s0"/>
<selinux context="system_u:system_r:virtd_t:s0-s0:c0.c1023"/>
<user id="0"/>
</whitelist>
_ATEOF













































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2004: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2004"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2004"
$at_failed && at_fn_log_failure
$at_traceon; }







        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2009: cp ./firewalld.conf ./firewalld.conf.orig"
at_fn_check_prepare_trace "firewall-cmd.at:2009"
( $at_check_trace; cp ./firewalld.conf ./firewalld.conf.orig
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2009"
$at_failed && at_fn_log_failure
$at_traceon; }

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2010: echo \"SomeBogusField=yes\" >> ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:2010"
( $at_check_trace; echo "SomeBogusField=yes" >> ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2010"
$at_failed && at_fn_log_failure
$at_traceon; }

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2011: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2011"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "ERROR: Invalid option: 'SomeBogusField=yes'
ERROR: Invalid option: 'SomeBogusField=yes'
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2011"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2016: cp ./firewalld.conf.orig ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:2016"
( $at_check_trace; cp ./firewalld.conf.orig ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2016"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<chain table="filter" ipv="ipv7" chain="foobar"/>
</direct>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2025: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2025"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:2025"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<rule />
</direct>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2033: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2033"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2033"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2034: rm ./direct.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2034"
( $at_check_trace; rm ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2034"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <user uid="666"/>
</whitelist>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2043: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2043"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2043"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <uid id="666"/>
</whitelist>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2051: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2051"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2051"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <group name="foobar" />
</whitelist>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2059: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2059"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2059"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2060: rm ./lockdown-whitelist.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2060"
( $at_check_trace; rm ./lockdown-whitelist.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2060"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2063: mkdir -p ./ipsets"
at_fn_check_prepare_trace "firewall-cmd.at:2063"
( $at_check_trace; mkdir -p ./ipsets
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2063"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry>12:34:56:78:90</entry>
</ipset>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2070: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2070"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: INVALID_ENTRY: invalid mac address '12:34:56:78:90' in '12:34:56:78:90', ignoring.
WARNING: INVALID_ENTRY: invalid mac address '12:34:56:78:90' in '12:34:56:78:90', ignoring.
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2070"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry bogus_attr="bogus">12:34:56:78:90:ab</entry>
</ipset>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2082: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2082"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2082"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:ip,bogus">
</ipset>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2089: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2089"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 119 $at_status "$at_srcdir/firewall-cmd.at:2089"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2090: rm ./ipsets/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2090"
( $at_check_trace; rm ./ipsets/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2090"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2093: mkdir -p ./helpers"
at_fn_check_prepare_trace "firewall-cmd.at:2093"
( $at_check_trace; mkdir -p ./helpers
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2093"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper>
</helper>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2099: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2099"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2099"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv7" module="nf_conntrack_ftp">
</helper>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2106: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2106"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:2106"
$at_failed && at_fn_log_failure
$at_traceon; }








    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv6" module="nf_conntrack_ftp">
<port protocol="aoeui" port="666" />
</helper>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2108: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2108"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2108"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2117: rm ./helpers/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2117"
( $at_check_trace; rm ./helpers/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2117"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2120: mkdir -p ./icmptypes"
at_fn_check_prepare_trace "firewall-cmd.at:2120"
( $at_check_trace; mkdir -p ./icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2120"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<bad_element />
<icmptype>
</icmptype>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2127: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2127"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2127"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<icmptype>
<destination unexpected_attr="foobar" />
</icmptype>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2135: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2135"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2135"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2136: rm ./icmptypes/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2136"
( $at_check_trace; rm ./icmptypes/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2136"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2139: mkdir -p ./services"
at_fn_check_prepare_trace "firewall-cmd.at:2139"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2139"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="aoeui" />
</service>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2146: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2146"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2146"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol bad_attr="foo" />
</service>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2154: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2154"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2154"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<bad_element />
</service>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2162: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2162"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2162"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<module module="bad_attr" />
</service>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2170: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2170"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2170"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="aoeu" port="666" />
</service>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2178: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2178"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2178"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="ssssssh" />
</service>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2186: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2186"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:2186"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="22" />
<source-port protocol="tcp" port="sssssh" />
</service>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2195: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2195"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:2195"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<destination ipv4="224.0.0.1" ipv7="1234" />
</service>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2203: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2203"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2203"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2204: rm ./services/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2204"
( $at_check_trace; rm ./services/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2204"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2207: mkdir -p ./zones"
at_fn_check_prepare_trace "firewall-cmd.at:2207"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2207"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/firewall-cmd.at:2211"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<service name="bogus_service_name" />
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2219: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2219"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:2219"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port protocol="ipv4" />
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2227: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2227"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2227"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<protocol value="thisdoesnotexist" />
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2235: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2235"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2235"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-block invalid_attr=""/>
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2243: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2243"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2243"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-type />
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2251: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2251"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2251"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<masquerade value="true" />
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2259: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2259"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2259"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port port="666" />
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2267: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2267"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2267"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port protocol="sctppp" />
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2275: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2275"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2275"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="-1" />
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2283: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2283"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2283"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<interface />
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2291: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2291"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2291"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source />
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2299: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2299"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: Invalid source: No address no ipset.
WARNING: Invalid source: No address no ipset.
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2299"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<limit />
</rule>
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2314: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2314"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2314"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<accept>
<limit value="none" />
</accept>
</rule>
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2327: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2327"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: INVALID_LIMIT: none: rule family=\"ipv4\" source address=\"10.0.0.1/24\" accept limit value=\"none\"
WARNING: INVALID_LIMIT: none: rule family=\"ipv4\" source address=\"10.0.0.1/24\" accept limit value=\"none\"
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2327"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<service name="bitcoin" />
<log prefix="WtsDMDAMJvd24wejRBsImI2VSkBaAlo1h2TVgEmH5CpL1YjdCTnjO8mizyp4cBDNq9NXS6QAuRnq/vF5xsid1orzY4jKzaWhm5qrktZLi38jinLFixX97d5JcM9o5tSx9XwQyaHUJMmxcjKYrDQ2Pvo1KMgf4f7yDAcKJaoJiNYp" />
</rule>
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2342: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2342"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: Invalid rule: Invalid log prefix
WARNING: Invalid rule: Invalid log prefix
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2342"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<log level="super_critical" />
</rule>
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2357: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2357"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: Invalid rule: Invalid log level
WARNING: Invalid rule: Invalid log level
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2357"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<forward-port port="1234" protocol="tcp" to-port="4321" to-addr="10.0.0.1" />
<nflog group="65536" />
</rule>
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2372: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2372"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: Invalid rule: Invalid nflog group value
WARNING: Invalid rule: Invalid nflog group value
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2372"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<port port="1234" protocol="tcp" />
<nflog queue-size="-1" />
</rule>
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2387: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2387"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: Invalid rule: Invalid nflog queue-size
WARNING: Invalid rule: Invalid nflog queue-size
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2387"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<audit prefix="foobar" />
</rule>
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2402: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2402"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2402"
$at_failed && at_fn_log_failure
$at_traceon; }








    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv6">
<source address="10.0.0.1/24" />
<accept />
</rule>
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2404: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2404"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: INVALID_ADDR: 10.0.0.1/24: rule family=\"ipv6\" source address=\"10.0.0.1/24\" accept
WARNING: INVALID_ADDR: 10.0.0.1/24: rule family=\"ipv6\" source address=\"10.0.0.1/24\" accept
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2404"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2420: rm ./zones/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2420"
( $at_check_trace; rm ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2420"
$at_failed && at_fn_log_failure
$at_traceon; }




      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_28
#AT_START_29
at_fn_group_banner 29 'rfc3964_ipv4.at:1' \
  "RFC3964_IPv4" "                                   " 2
at_xfail=no
(
  $as_echo "29. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:4: sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:4"
( $at_check_trace; sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:5: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:5"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }














































{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:72: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:72"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }

















































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_29
#AT_START_30
at_fn_group_banner 30 'service_include.at:1' \
  "service include" "                                " 2
at_xfail=no
(
  $as_echo "30. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






{ set +x
$as_echo "$at_srcdir/service_include.at:4: mkdir -p ./services"
at_fn_check_prepare_trace "service_include.at:4"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:5: cat <<HERE > ./services/my-service-with-include.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol=\"tcp\" port=\"12345\"/>
  <include service=\"ssdp\"/>
  <include service=\"mdns\"/>
  <include service=\"recursive-service\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:5"
( $at_check_trace; cat <<HERE > ./services/my-service-with-include.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol="tcp" port="12345"/>
  <include service="ssdp"/>
  <include service="mdns"/>
  <include service="recursive-service"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:17: cat <<HERE > ./services/recursive-service.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service=\"my-service-with-include\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:17"
( $at_check_trace; cat <<HERE > ./services/recursive-service.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service="my-service-with-include"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





























































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:86: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --query-include=recursive-service                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --query-include=recursive-service                 " "service_include.at:86"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:87: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=my-service-with-include --add-include=ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=my-service-with-include --add-include=ssh                 " "service_include.at:87"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:88: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --query-include=ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --query-include=ssh                 " "service_include.at:88"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/service_include.at:89: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:89"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:90: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=my-service-with-include --remove-include=ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=my-service-with-include --remove-include=ssh                 " "service_include.at:90"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:91: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --query-include=ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --query-include=ssh                 " "service_include.at:91"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/service_include.at:92: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:92"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:93: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --get-includes                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --get-includes                 " "service_include.at:93"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:96: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:96"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:118: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service" "service_include.at:118"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:119: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh" "service_include.at:119"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:120: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:120"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:121: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:121"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:121"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:122: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh" "service_include.at:122"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:123: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:123"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:124: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:124"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:125: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes" "service_include.at:125"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:128: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }"
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:128"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:128"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:140: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --add-include=does-not-exist                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --add-include=does-not-exist                 " "service_include.at:140"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --add-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/service_include.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:141: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --add-include=does-not-exist"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --add-include=does-not-exist" "service_include.at:141"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --add-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/service_include.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }





      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_30
#AT_START_31
at_fn_group_banner 31 'helpers_custom.at:1' \
  "customer helpers" "                               " 2
at_xfail=no
(
  $as_echo "31. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-helper=\"ftptest\" --module=\"nf_conntrack_ftp\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-helper=\"ftptest\" --module=\"nf_conntrack_ftp\"                 " "helpers_custom.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-helper="ftptest" --module="nf_conntrack_ftp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:5: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --helper=ftptest --add-port=\"2121/tcp\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --helper=ftptest --add-port=\"2121/tcp\"                 " "helpers_custom.at:5"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --helper=ftptest --add-port="2121/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:7: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-service=\"ftptest\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-service=\"ftptest\"                 " "helpers_custom.at:7"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-service="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:8: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-module=\"ftptest\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-module=\"ftptest\"                 " "helpers_custom.at:8"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:9: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --query-module=\"ftptest\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --query-module=\"ftptest\"                 " "helpers_custom.at:9"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --query-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:10: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-port=\"2121/tcp\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-port=\"2121/tcp\"                 " "helpers_custom.at:10"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-port="2121/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:11: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:11"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules: ftptest
destination:
includes:
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:62: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --remove-module=\"ftptest\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --remove-module=\"ftptest\"                 " "helpers_custom.at:62"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --remove-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:63: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --query-module=\"ftptest\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --query-module=\"ftptest\"                 " "helpers_custom.at:63"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --query-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/helpers_custom.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:64: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-helper=\"ftptest\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-helper=\"ftptest\"                 " "helpers_custom.at:64"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-helper="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:65: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:65"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules:
destination:
includes:
helpers: ftptest
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:116: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-module=\"ftptest\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-module=\"ftptest\"                 " "helpers_custom.at:116"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:117: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --remove-helper=\"ftptest\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --remove-helper=\"ftptest\"                 " "helpers_custom.at:117"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --remove-helper="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:118: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-helper=\"ftp\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-helper=\"ftp\"                 " "helpers_custom.at:118"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-helper="ftp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:119: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-port=\"21/tcp\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-port=\"21/tcp\"                 " "helpers_custom.at:119"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-port="21/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }


































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_31
#AT_START_32
at_fn_group_banner 32 'policy.at:5' \
  "policy - xml" "                                   " 2
at_xfail=no
(
  $as_echo "32. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






{ set +x
$as_echo "$at_srcdir/policy.at:8: mkdir -p ./policies"
at_fn_check_prepare_trace "policy.at:8"
( $at_check_trace; mkdir -p ./policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }


cat >./policies/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<policy target="CONTINUE" priority="-123">
<short>foobar</short>
<description>foobar policy</description>
<ingress-zone name="public" />
<egress-zone name="ANY" />
<service name="ssh" />
<service name="https" />
<port port="1234" protocol="tcp" />
<icmp-block name="echo-request" />
<masquerade />
<forward-port port="1234" protocol="tcp" to-port="4321" to-addr="10.10.10.1" />
<source-port port="1234" protocol="udp" />
<protocol value="ipv6-icmp" />
<rule family="ipv4">
    <source address="10.10.10.0/24" />
    <destination address="192.168.10.0/24" />
    <service name="ssh" />
    <accept>
        <limit value="5/m" />
    </accept>
</rule>
<rule>
    <port port="1234" protocol="tcp" />
    <reject />
</rule>
<rule family="ipv4">
    <source address="10.10.10.0/24" />
    <icmp-block name="echo-request" />
</rule>
<rule>
    <icmp-type name="echo-reply" />
    <drop />
</rule>
<rule family="ipv4">
    <forward-port port="1234" protocol="tcp" to-port="4321" to-addr="10.10.10.1" />
</rule>
<rule>
    <source-port port="1234" protocol="udp" />
    <log prefix="LOG: " level="warning" />
</rule>
<rule>
    <source-port port="1234" protocol="tcp" />
    <nflog group="1" prefix="NFLOG: " queue-size="10">
        <limit value="5/m" />
    </nflog>
</rule>
<rule family="ipv6">
    <protocol value="ipv6-icmp" />
    <audit />
    <accept />
</rule>
<rule family="ipv4">
    <destination address="192.168.10.0/24" />
    <mark set="123" />
</rule>
</policy>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:70: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "policy.at:70"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }




































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_32
#AT_START_33
at_fn_group_banner 33 'policy.at:79' \
  "policy - create" "                                " 2
at_xfail=no
(
  $as_echo "33. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:79: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:79"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:79: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:79"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:83: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy worldToHost                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy worldToHost                 " "policy.at:83"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy worldToHost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:84: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy hostToWorld                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy hostToWorld                 " "policy.at:84"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy hostToWorld
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:85: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy zoneToZone                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy zoneToZone                 " "policy.at:85"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy zoneToZone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:86: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-policies                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-policies                 " "policy.at:86"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 hostToWorld worldToHost zoneToZone
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }

















































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_33
#AT_START_34
at_fn_group_banner 34 'policy.at:96' \
  "policy - name" "                                  " 2
at_xfail=no
(
  $as_echo "34. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:96: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:96"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:96: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:96"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:100: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy 123456789012345678                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy 123456789012345678                 " "policy.at:100"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy 123456789012345678
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:101: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy 1234567890123456789                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy 1234567890123456789                 " "policy.at:101"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy 1234567890123456789
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 116 $at_status "$at_srcdir/policy.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:104: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy public                 " "policy.at:104"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/policy.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:105: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone allow-host-ipv6                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone allow-host-ipv6                 " "policy.at:105"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone allow-host-ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/policy.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_34
#AT_START_35
at_fn_group_banner 35 'policy.at:109' \
  "policy - list" "                                  " 2
at_xfail=no
(
  $as_echo "35. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:109: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:109"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:109: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:109"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:131: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-policy allow-host-ipv6 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:131"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-policy allow-host-ipv6 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:131"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:170: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all-policies | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:170"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all-policies | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:209: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:209"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:209"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_35
#AT_START_36
at_fn_group_banner 36 'policy.at:231' \
  "policy - options" "                               " 2
at_xfail=no
(
  $as_echo "36. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:231: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:231"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:231: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:231"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:236: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --zone public                 " "policy.at:236"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:240: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-interface foobar0                 " "policy.at:240"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:240"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:242: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --remove-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --remove-interface foobar0                 " "policy.at:242"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:244: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --query-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --query-interface foobar0                 " "policy.at:244"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --query-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:246: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --list-interfaces                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --list-interfaces                 " "policy.at:246"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:250: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-source 10.10.10.0/24                 " "policy.at:250"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:250"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:252: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --remove-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --remove-source 10.10.10.0/24                 " "policy.at:252"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:254: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --query-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --query-source 10.10.10.0/24                 " "policy.at:254"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --query-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:256: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --list-sources                 " "policy.at:256"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:260: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-forward                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-forward                 " "policy.at:260"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:260"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:262: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --remove-forward                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --remove-forward                 " "policy.at:262"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:262"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:264: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --query-forward                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --query-forward                 " "policy.at:264"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:264"
$at_failed && at_fn_log_failure
$at_traceon; }









































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:271: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-egress-zone public                 " "policy.at:271"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:271"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:272: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-egress-zone public                 " "policy.at:272"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:272"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:273: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-egress-zone public                 " "policy.at:273"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:274: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-egress-zones                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-egress-zones                 " "policy.at:274"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-egress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:274"
$at_failed && at_fn_log_failure
$at_traceon; }








































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:279: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-ingress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-ingress-zone public                 " "policy.at:279"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:280: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-ingress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-ingress-zone public                 " "policy.at:280"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:281: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-ingress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-ingress-zone public                 " "policy.at:281"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:281"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:282: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-ingress-zones                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-ingress-zones                 " "policy.at:282"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-ingress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_36
#AT_START_37
at_fn_group_banner 37 'policy.at:286' \
  "policy - priority" "                              " 2
at_xfail=no
(
  $as_echo "37. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:286: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:286"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:286: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:286"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:289: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --add-interface dummy0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --add-interface dummy0                 " "policy.at:289"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --add-interface dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:289"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:292: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy worldToHost                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy worldToHost                 " "policy.at:292"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy worldToHost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:293: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --add-ingress-zone ANY                 " "policy.at:293"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:293"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:294: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --add-egress-zone HOST                 " "policy.at:294"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:295: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority -1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority -1                 " "policy.at:295"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:296: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --get-priority                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --get-priority                 " "policy.at:296"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-1
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:296"
$at_failed && at_fn_log_failure
$at_traceon; }


























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:336: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority 1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority 1                 " "policy.at:336"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority 1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:336"
$at_failed && at_fn_log_failure
$at_traceon; }


























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:374: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy first                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy first                 " "policy.at:374"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy first
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:374"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:375: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy first --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy first --add-ingress-zone ANY                 " "policy.at:375"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy first --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:376: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy first --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy first --add-egress-zone HOST                 " "policy.at:376"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy first --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:377: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy second                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy second                 " "policy.at:377"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy second
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:377"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:378: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy second --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy second --add-ingress-zone ANY                 " "policy.at:378"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy second --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:378"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:379: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy second --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy second --add-egress-zone HOST                 " "policy.at:379"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy second --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:379"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:380: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy third                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy third                 " "policy.at:380"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy third
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:380"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:381: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy third --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy third --add-ingress-zone ANY                 " "policy.at:381"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy third --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:381"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:382: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy third --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy third --add-egress-zone HOST                 " "policy.at:382"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy third --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:382"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:383: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy fourth                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy fourth                 " "policy.at:383"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy fourth
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:383"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:384: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fourth --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fourth --add-ingress-zone ANY                 " "policy.at:384"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fourth --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:384"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:385: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fourth --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fourth --add-egress-zone HOST                 " "policy.at:385"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fourth --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:385"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:386: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy fifth                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy fifth                 " "policy.at:386"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy fifth
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:386"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:387: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fifth --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fifth --add-ingress-zone ANY                 " "policy.at:387"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fifth --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:387"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:388: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fifth --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fifth --add-egress-zone HOST                 " "policy.at:388"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fifth --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:388"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:390: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fourth --set-priority -100                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fourth --set-priority -100                 " "policy.at:390"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fourth --set-priority -100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:390"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:391: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy second --set-priority -5000                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy second --set-priority -5000                 " "policy.at:391"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy second --set-priority -5000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:391"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:392: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy first --set-priority -10000                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy first --set-priority -10000                 " "policy.at:392"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy first --set-priority -10000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:392"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:393: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy third --set-priority -1000                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy third --set-priority -1000                 " "policy.at:393"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy third --set-priority -1000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:393"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:394: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fifth --set-priority -10                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fifth --set-priority -10                 " "policy.at:394"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fifth --set-priority -10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }


























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:462: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority 0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority 0                 " "policy.at:462"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/policy.at:462"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:463: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority -32769                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority -32769                 " "policy.at:463"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority -32769
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/policy.at:463"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:464: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority -32768                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority -32768                 " "policy.at:464"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority -32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:464"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:465: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority  32768                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority  32768                 " "policy.at:465"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority  32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/policy.at:465"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:466: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority  32767                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority  32767                 " "policy.at:466"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority  32767
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:466"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_37
#AT_START_38
at_fn_group_banner 38 'policy.at:470' \
  "policy - zones" "                                 " 2
at_xfail=no
(
  $as_echo "38. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:470: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:470"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:470: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:470"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:473: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface=foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface=foobar0                 " "policy.at:473"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:473"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:474: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface=foobar1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface=foobar1                 " "policy.at:474"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:476: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "policy.at:476"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:476"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:477: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-priority -1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-priority -1                 " "policy.at:477"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:477"
$at_failed && at_fn_log_failure
$at_traceon; }

















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:481: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"HOST\"                 " "policy.at:481"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:481"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:482: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"HOST\"                 " "policy.at:482"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:482"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:483: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"ANY\"                 " "policy.at:483"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:483"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:484: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 " "policy.at:484"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:484"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:485: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"HOST\"                 " "policy.at:485"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:485"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:486: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"ANY\"                 " "policy.at:486"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:486"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:487: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"ANY\"                 " "policy.at:487"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:487"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:488: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"HOST\"                 " "policy.at:488"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:488"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:489: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 " "policy.at:489"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:489"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:490: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"ANY\"                 " "policy.at:490"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:490"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:491: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 " "policy.at:491"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:491"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:492: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"public\"                 " "policy.at:492"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:493: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"internal\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"internal\"                 " "policy.at:493"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:493"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:494: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"internal\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"internal\"                 " "policy.at:494"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:494"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:495: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"ANY\"                 " "policy.at:495"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:495"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:496: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"HOST\"                 " "policy.at:496"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:496"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:497: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"ANY\"                 " "policy.at:497"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:497"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:498: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"HOST\"                 " "policy.at:498"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:499: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"public\"                 " "policy.at:499"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:499"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:500: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"internal\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"internal\"                 " "policy.at:500"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:500"
$at_failed && at_fn_log_failure
$at_traceon; }

























































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:523: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"HOST\"                 " "policy.at:523"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:523"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:524: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"ANY\"                 " "policy.at:524"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:524"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:525: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"public\"                 " "policy.at:525"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:525"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:526: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"HOST\"                 " "policy.at:526"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:526"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:527: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"ANY\"                 " "policy.at:527"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:527"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:528: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"HOST\"                 " "policy.at:528"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:528"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:529: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"public\"                 " "policy.at:529"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:529"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:530: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"ANY\"                 " "policy.at:530"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:530"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:531: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"public\"                 " "policy.at:531"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:531"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:532: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"internal\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"internal\"                 " "policy.at:532"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:532"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:533: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"ANY\"                 " "policy.at:533"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:534: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"HOST\"                 " "policy.at:534"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:534"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:535: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"public\"                 " "policy.at:535"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:535"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:536: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"internal\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"internal\"                 " "policy.at:536"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:536"
$at_failed && at_fn_log_failure
$at_traceon; }











































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:553: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"ANY\"                 " "policy.at:553"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:553"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:554: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"ANY\"                 " "policy.at:554"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:554"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:555: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone=\"ANY\"                 " "policy.at:555"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:555"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:556: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone=\"ANY\"                 " "policy.at:556"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:556"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:557: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"ANY\"                 " "policy.at:557"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:557"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:558: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"ANY\"                 " "policy.at:558"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:558"
$at_failed && at_fn_log_failure
$at_traceon; }



































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:567: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 " "policy.at:567"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:567"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:568: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"public\"                 " "policy.at:568"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:568"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:569: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone=\"public\"                 " "policy.at:569"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:569"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:570: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone=\"public\"                 " "policy.at:570"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:570"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:571: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"public\"                 " "policy.at:571"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:571"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:572: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"public\"                 " "policy.at:572"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:572"
$at_failed && at_fn_log_failure
$at_traceon; }



































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:581: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"HOST\"                 " "policy.at:581"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:581"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:582: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"HOST\"                 " "policy.at:582"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:582"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:583: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"HOST\"                 " "policy.at:583"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:583"
$at_failed && at_fn_log_failure
$at_traceon; }




























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:589: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"does_not_exist\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"does_not_exist\"                 " "policy.at:589"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:589"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:590: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"does_not_exist\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"does_not_exist\"                 " "policy.at:590"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:590"
$at_failed && at_fn_log_failure
$at_traceon; }















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:597: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 " "policy.at:597"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:597"
$at_failed && at_fn_log_failure
$at_traceon; }






































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:668: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"internal\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"internal\"                 " "policy.at:668"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:668"
$at_failed && at_fn_log_failure
$at_traceon; }






































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:748: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"public\"                 " "policy.at:748"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:748"
$at_failed && at_fn_log_failure
$at_traceon; }


























































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_38
#AT_START_39
at_fn_group_banner 39 'policy.at:822' \
  "policy - dispatch" "                              " 2
at_xfail=no
(
  $as_echo "39. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:822: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:822"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:822: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:822"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:825: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface=foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface=foobar0                 " "policy.at:825"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:825"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:826: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface=foobar1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface=foobar1                 " "policy.at:826"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:826"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:828: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "policy.at:828"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:828"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:829: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-priority -1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-priority -1                 " "policy.at:829"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:829"
$at_failed && at_fn_log_failure
$at_traceon; }





















































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_39
#AT_START_40
at_fn_group_banner 40 'policy.at:5351' \
  "policy - interfaces/sources" "                    " 2
at_xfail=no
(
  $as_echo "40. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:5351: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5351"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5351"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:5351: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:5351"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5351"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:5354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "policy.at:5354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5354"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:5355: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-ingress-zone internal                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-ingress-zone internal                 " "policy.at:5355"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5355"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:5356: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-interface foobar0                 " "policy.at:5356"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5356"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:5357: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-egress-zone public                 " "policy.at:5357"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5357"
$at_failed && at_fn_log_failure
$at_traceon; }


















































































































































































































































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_40
#AT_START_41
at_fn_group_banner 41 'policy.at:6072' \
  "policy - target" "                                " 2
at_xfail=no
(
  $as_echo "41. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:6072: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6072"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6072"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:6072: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:6072"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6072"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6075: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "policy.at:6075"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6075"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6077: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=CONTINUE                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=CONTINUE                 " "policy.at:6077"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=CONTINUE
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6077"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6078: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=ACCEPT                 " "policy.at:6078"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6078"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6079: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=DROP                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=DROP                 " "policy.at:6079"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6079"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6080: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=REJECT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=REJECT                 " "policy.at:6080"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=REJECT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6080"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6081: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=DENY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=DENY                 " "policy.at:6081"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=DENY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/policy.at:6081"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6082: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=default                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=default                 " "policy.at:6082"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/policy.at:6082"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6085: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=ACCEPT                 " "policy.at:6085"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6085"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6086: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-ingress-zone internal                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-ingress-zone internal                 " "policy.at:6086"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6086"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6087: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-interface foobar0                  "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-interface foobar0                  " "policy.at:6087"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6087"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6088: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-egress-zone HOST                 " "policy.at:6088"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6088"
$at_failed && at_fn_log_failure
$at_traceon; }













































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_41
#AT_START_42
at_fn_group_banner 42 'policy.at:6121' \
  "policy - from file" "                             " 2
at_xfail=no
(
  $as_echo "42. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:6121: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6121"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6121"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:6121: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:6121"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6121"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6124: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-protocol ipv6-icmp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-protocol ipv6-icmp                 " "policy.at:6124"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6124"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/policy.at:6125: ls \"./policies/allow-host-ipv6.xml\""
at_fn_check_prepare_trace "policy.at:6125"
( $at_check_trace; ls "./policies/allow-host-ipv6.xml"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6125"
$at_failed && at_fn_log_failure
$at_traceon; }
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6126: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy-from-file \"./policies/allow-host-ipv6.xml\" --name my-allow-host-ipv6                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy-from-file \"./policies/allow-host-ipv6.xml\" --name my-allow-host-ipv6                 " "policy.at:6126"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy-from-file "./policies/allow-host-ipv6.xml" --name my-allow-host-ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6126"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/policy.at:6127: ls \"./policies/my-allow-host-ipv6.xml\""
at_fn_check_prepare_trace "policy.at:6127"
( $at_check_trace; ls "./policies/my-allow-host-ipv6.xml"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6127"
$at_failed && at_fn_log_failure
$at_traceon; }
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6128: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-policies                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-policies                 " "policy.at:6128"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 my-allow-host-ipv6
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6128"
$at_failed && at_fn_log_failure
$at_traceon; }

















































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_42
#AT_START_43
at_fn_group_banner 43 'policy.at:6138' \
  "policy - zone drifting not allowed" "             " 2
at_xfail=no
(
  $as_echo "43. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:6138: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6138"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6138"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:6138: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:6138"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6138"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6141: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone external --add-interface dummy0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone external --add-interface dummy0                 " "policy.at:6141"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone external --add-interface dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6141"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6142: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-source 10.0.0.0/8                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-source 10.0.0.0/8                 " "policy.at:6142"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-source 10.0.0.0/8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6142"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6143: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --add-source 10.10.0.0/16                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --add-source 10.10.0.0/16                 " "policy.at:6143"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --add-source 10.10.0.0/16
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6143"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6144: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone trusted --add-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone trusted --add-source 10.10.10.0/24                 " "policy.at:6144"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone trusted --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6144"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6147: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy policy-1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy policy-1                 " "policy.at:6147"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy policy-1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6147"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6148: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-1 --add-ingress-zone internal                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-1 --add-ingress-zone internal                 " "policy.at:6148"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-1 --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6148"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6149: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-1 --add-ingress-zone trusted                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-1 --add-ingress-zone trusted                 " "policy.at:6149"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-1 --add-ingress-zone trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6149"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6150: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-1 --add-egress-zone external                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-1 --add-egress-zone external                 " "policy.at:6150"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-1 --add-egress-zone external
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6150"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6152: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy policy-2                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy policy-2                 " "policy.at:6152"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy policy-2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6152"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6153: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-2 --add-ingress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-2 --add-ingress-zone public                 " "policy.at:6153"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-2 --add-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6153"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6154: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-2 --add-egress-zone external                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-2 --add-egress-zone external                 " "policy.at:6154"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-2 --add-egress-zone external
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6154"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6156: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy policy-3                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy policy-3                 " "policy.at:6156"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy policy-3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6156"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6157: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-3 --set-priority 10                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-3 --set-priority 10                 " "policy.at:6157"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-3 --set-priority 10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6157"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6158: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-3 --add-ingress-zone trusted                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-3 --add-ingress-zone trusted                 " "policy.at:6158"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-3 --add-ingress-zone trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6158"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:6159: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-3 --add-egress-zone external                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-3 --add-egress-zone external                 " "policy.at:6159"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy policy-3 --add-egress-zone external
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6159"
$at_failed && at_fn_log_failure
$at_traceon; }















































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_43
#AT_START_44
at_fn_group_banner 44 'services.at:1' \
  "services" "                                       " 2
at_xfail=no
(
  $as_echo "44. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/services.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/services.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "services.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "services.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:5: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 " "services.at:5"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 " "services.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:10: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-service ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-service ssh                 " "services.at:10"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:11: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept'                 " "services.at:11"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:12: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-service ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-service ssh                 " "services.at:12"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:13: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept'                 " "services.at:13"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:32: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-service-from-policy ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-service-from-policy ssh                 " "services.at:32"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-service-from-policy ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:37: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept'                 " "services.at:37"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:38: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-service ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-service ssh                 " "services.at:38"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:39: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept'                 " "services.at:39"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }











































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:90: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-service does-not-exist                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-service does-not-exist                 " "services.at:90"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-service does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/services.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:94: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-interface raboof0 --add-service ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-interface raboof0 --add-service ssh                 " "services.at:94"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-interface raboof0 --add-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/services.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }





















      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_44
#AT_START_45
at_fn_group_banner 45 'ports.at:1' \
  "ports" "                                          " 2
at_xfail=no
(
  $as_echo "45. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/ports.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/ports.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "ports.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "ports.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:5: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 " "ports.at:5"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 " "ports.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:9: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234/tcp                 " "ports.at:9"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:10: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234/udp                 " "ports.at:10"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:11: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 4321/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 4321/udp                 " "ports.at:11"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:12: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=4444 protocol=udp accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=4444 protocol=udp accept'                 " "ports.at:12"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:13: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/tcp                 " "ports.at:13"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:14: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/udp                 " "ports.at:14"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:15: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 4321/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 4321/udp                 " "ports.at:15"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:16: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept'                 " "ports.at:16"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }













































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:44: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-port 1234/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-port 1234/tcp                 " "ports.at:44"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:45: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/tcp                 " "ports.at:45"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:46: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/udp                 " "ports.at:46"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:47: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-port 1234/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-port 1234/udp                 " "ports.at:47"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:48: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-port 4321/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-port 4321/udp                 " "ports.at:48"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:49: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept'                 " "ports.at:49"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }





































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:93: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234                 " "ports.at:93"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:95: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 123443/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 123443/tcp                 " "ports.at:95"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:97: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234/bogus                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234/bogus                 " "ports.at:97"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:100: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=4444 accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=4444 accept'                 " "ports.at:100"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:102: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept'                 " "ports.at:102"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:104: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept'                 " "ports.at:104"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }





















      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_45
#AT_START_46
at_fn_group_banner 46 'source_ports.at:1' \
  "source ports" "                                   " 2
at_xfail=no
(
  $as_echo "46. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/source_ports.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/source_ports.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "source_ports.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "source_ports.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:5: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 " "source_ports.at:5"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 " "source_ports.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:9: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234/tcp                 " "source_ports.at:9"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:10: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234/udp                 " "source_ports.at:10"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:11: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 4321/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 4321/udp                 " "source_ports.at:11"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:12: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=udp accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=udp accept'                 " "source_ports.at:12"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:13: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/tcp                 " "source_ports.at:13"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:14: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/udp                 " "source_ports.at:14"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:15: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 4321/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 4321/udp                 " "source_ports.at:15"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:16: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept'                 " "source_ports.at:16"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }













































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:44: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-source-port 1234/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-source-port 1234/tcp                 " "source_ports.at:44"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:45: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/tcp                 " "source_ports.at:45"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:46: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/udp                 " "source_ports.at:46"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:47: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-source-port 1234/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-source-port 1234/udp                 " "source_ports.at:47"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:48: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-source-port 4321/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-source-port 4321/udp                 " "source_ports.at:48"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:49: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept'                 " "source_ports.at:49"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }





































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:93: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234                 " "source_ports.at:93"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:95: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 123443/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 123443/tcp                 " "source_ports.at:95"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:97: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234/bogus                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234/bogus                 " "source_ports.at:97"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:100: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=4444 accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=4444 accept'                 " "source_ports.at:100"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:102: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept'                 " "source_ports.at:102"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:104: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept'                 " "source_ports.at:104"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }





















      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_46
#AT_START_47
at_fn_group_banner 47 'forward_ports.at:1' \
  "forward ports" "                                  " 2
at_xfail=no
(
  $as_echo "47. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/forward_ports.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/forward_ports.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "forward_ports.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "forward_ports.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:5: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 " "forward_ports.at:5"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone ANY                 " "forward_ports.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:9: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10                 " "forward_ports.at:9"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:10: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321                 " "forward_ports.at:10"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:13: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 " "forward_ports.at:13"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:14: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10                 " "forward_ports.at:14"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:15: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321                 " "forward_ports.at:15"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:18: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 " "forward_ports.at:18"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:41: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10                 " "forward_ports.at:41"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:42: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10                 " "forward_ports.at:42"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:43: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321                 " "forward_ports.at:43"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:46: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 " "forward_ports.at:46"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:88: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port 1234                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port 1234                 " "forward_ports.at:88"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:90: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=11:proto=tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=11:proto=tcp                 " "forward_ports.at:90"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=11:proto=tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:92: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111                 " "forward_ports.at:92"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:94: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10                 " "forward_ports.at:94"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:97: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444'                 " "forward_ports.at:97"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:99: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp'                 " "forward_ports.at:99"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/forward_ports.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:101: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111'                 " "forward_ports.at:101"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:103: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10'                 " "forward_ports.at:103"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:106: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone ANY                 " "forward_ports.at:106"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:110: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 " "forward_ports.at:110"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:111: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 " "forward_ports.at:111"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:112: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 " "forward_ports.at:112"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:113: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 " "forward_ports.at:113"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:114: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'                 " "forward_ports.at:114"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }






























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:134: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222                 " "forward_ports.at:134"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:135: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'                 " "forward_ports.at:135"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:136: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone HOST                 " "forward_ports.at:136"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:136"
$at_failed && at_fn_log_failure
$at_traceon; }




























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:142: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone ANY                 " "forward_ports.at:142"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:142"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:143: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 " "forward_ports.at:143"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:144: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 " "forward_ports.at:144"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:144"
$at_failed && at_fn_log_failure
$at_traceon; }




























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:149: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 " "forward_ports.at:149"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:149"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:150: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone ANY                 " "forward_ports.at:150"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:150"
$at_failed && at_fn_log_failure
$at_traceon; }















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:155: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-interface foobar0                 " "forward_ports.at:155"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:155"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:156: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone internal                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone internal                 " "forward_ports.at:156"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:156"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:157: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 " "forward_ports.at:157"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:157"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:158: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 " "forward_ports.at:158"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:158"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:159: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'                 " "forward_ports.at:159"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:159"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:160: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 " "forward_ports.at:160"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:160"
$at_failed && at_fn_log_failure
$at_traceon; }



































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:168: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --remove-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --remove-interface foobar0                 " "forward_ports.at:168"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:173: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-source 10.10.10.0/24                 " "forward_ports.at:173"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:173"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:174: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 " "forward_ports.at:174"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:175: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 " "forward_ports.at:175"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:175"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:176: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'                 " "forward_ports.at:176"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:176"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:177: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 " "forward_ports.at:177"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:177"
$at_failed && at_fn_log_failure
$at_traceon; }















































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_47
#AT_START_48
at_fn_group_banner 48 'forward_ports.at:199' \
  "forward ports (OUTPUT)" "                         " 2
at_xfail=no
(
  $as_echo "48. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/forward_ports.at:199: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:199"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/forward_ports.at:199: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "forward_ports.at:199"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:202: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "forward_ports.at:202"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:202"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:203: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone localhost                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone localhost                 " "forward_ports.at:203"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone localhost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:203"
$at_failed && at_fn_log_failure
$at_traceon; }

















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:209: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-ingress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-ingress-zone HOST                 " "forward_ports.at:209"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:209"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-egress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-egress-zone ANY                 " "forward_ports.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 " "forward_ports.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 " "forward_ports.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:213: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'                 " "forward_ports.at:213"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 " "forward_ports.at:214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }









































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:234: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-ingress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-ingress-zone HOST                 " "forward_ports.at:234"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:235: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-egress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-egress-zone ANY                 " "forward_ports.at:235"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:235"
$at_failed && at_fn_log_failure
$at_traceon; }















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:242: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone localhost --add-source 127.0.0.0/8                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone localhost --add-source 127.0.0.0/8                 " "forward_ports.at:242"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone localhost --add-source 127.0.0.0/8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:243: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-ingress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-ingress-zone HOST                 " "forward_ports.at:243"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:244: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-egress-zone localhost                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-egress-zone localhost                 " "forward_ports.at:244"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-egress-zone localhost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:245: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 " "forward_ports.at:245"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:246: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 " "forward_ports.at:246"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:247: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'                 " "forward_ports.at:247"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:247"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:248: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 " "forward_ports.at:248"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:248"
$at_failed && at_fn_log_failure
$at_traceon; }






















































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:269: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone localhost --remove-source 127.0.0.0/8                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone localhost --remove-source 127.0.0.0/8                 " "forward_ports.at:269"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone localhost --remove-source 127.0.0.0/8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:270: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-ingress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-ingress-zone HOST                 " "forward_ports.at:270"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:271: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-egress-zone localhost                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-egress-zone localhost                 " "forward_ports.at:271"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-egress-zone localhost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:271"
$at_failed && at_fn_log_failure
$at_traceon; }















































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_48
#AT_START_49
at_fn_group_banner 49 'masquerade.at:1' \
  "masquerade" "                                     " 2
at_xfail=no
(
  $as_echo "49. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/masquerade.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/masquerade.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "masquerade.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface foobar0                 " "masquerade.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "masquerade.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:7: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 " "masquerade.at:7"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:8: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone public                 " "masquerade.at:8"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:11: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-masquerade                 " "masquerade.at:11"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:12: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 " "masquerade.at:12"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:13: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-masquerade                 " "masquerade.at:13"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:14: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 " "masquerade.at:14"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }



















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:32: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-masquerade                 " "masquerade.at:32"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:33: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 " "masquerade.at:33"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:34: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-masquerade                 " "masquerade.at:34"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:35: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 " "masquerade.at:35"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }











































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:71: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar_host                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar_host                 " "masquerade.at:71"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar_host
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:72: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-ingress-zone internal                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-ingress-zone internal                 " "masquerade.at:72"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:73: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-egress-zone HOST                 " "masquerade.at:73"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }
















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:75: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-masquerade                 " "masquerade.at:75"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:76: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 " "masquerade.at:76"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }














































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:79: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --remove-ingress-zone internal                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --remove-ingress-zone internal                 " "masquerade.at:79"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --remove-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:80: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --remove-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --remove-egress-zone HOST                 " "masquerade.at:80"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:82: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar_int_to_pub                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar_int_to_pub                 " "masquerade.at:82"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar_int_to_pub
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:82: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface foobar1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface foobar1                 " "masquerade.at:82"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:82: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-ingress-zone internal                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-ingress-zone internal                 " "masquerade.at:82"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:82: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-egress-zone public                 " "masquerade.at:82"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }
















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:82: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-masquerade                 " "masquerade.at:82"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:82: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 " "masquerade.at:82"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }














































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:82: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --remove-interface foobar1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --remove-interface foobar1                 " "masquerade.at:82"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --remove-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:112: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-source 10.10.10.0/24                 " "masquerade.at:112"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }
















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:114: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-masquerade                 " "masquerade.at:114"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:115: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 " "masquerade.at:115"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:116: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --remove-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --remove-source 10.10.10.0/24                 " "masquerade.at:116"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:118: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-source 10.10.10.0/24                 " "masquerade.at:118"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:118: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface foobar1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface foobar1                 " "masquerade.at:118"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }
















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:118: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-masquerade                 " "masquerade.at:118"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:118: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 " "masquerade.at:118"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }














































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:118: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --remove-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --remove-source 10.10.10.0/24                 " "masquerade.at:118"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:118: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --remove-interface foobar1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --remove-interface foobar1                 " "masquerade.at:118"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --remove-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }









      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_49
#AT_START_50
at_fn_group_banner 50 'protocols.at:1' \
  "protocols" "                                      " 2
at_xfail=no
(
  $as_echo "50. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/protocols.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/protocols.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "protocols.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "protocols.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:5: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 " "protocols.at:5"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 " "protocols.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:9: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol ipv6-icmp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol ipv6-icmp                 " "protocols.at:9"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:10: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol dccp                 " "protocols.at:10"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:11: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol gre                 " "protocols.at:11"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:12: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule protocol value=\"sctp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule protocol value=\"sctp\" accept'                 " "protocols.at:12"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:13: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol ipv6-icmp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol ipv6-icmp                 " "protocols.at:13"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:14: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol dccp                 " "protocols.at:14"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:15: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol gre                 " "protocols.at:15"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:16: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept'                 " "protocols.at:16"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }













































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:44: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-protocol ipv6-icmp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-protocol ipv6-icmp                 " "protocols.at:44"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:45: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol ipv6-icmp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol ipv6-icmp                 " "protocols.at:45"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:46: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol dccp                 " "protocols.at:46"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:47: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-protocol dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-protocol dccp                 " "protocols.at:47"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:48: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-protocol gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-protocol gre                 " "protocols.at:48"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:49: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept'                 " "protocols.at:49"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }





































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:93: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol dummy                 " "protocols.at:93"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:95: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule protocol value=\"dummy\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule protocol value=\"dummy\" accept'                 " "protocols.at:95"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule protocol value="dummy" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }





















      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_50
#AT_START_51
at_fn_group_banner 51 'rich_rules.at:1' \
  "rich rules" "                                     " 2
at_xfail=no
(
  $as_echo "51. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rich_rules.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rich_rules.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rich_rules.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:7: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "rich_rules.at:7"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:8: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 " "rich_rules.at:8"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:9: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 " "rich_rules.at:9"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:42: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4             source address=10.10.10.10 accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4             source address=10.10.10.10 accept'                 " "rich_rules.at:42"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4             source address=10.10.10.10 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:43: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 log accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 log accept'                 " "rich_rules.at:43"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 log accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:44: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 audit accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 audit accept'                 " "rich_rules.at:44"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:45: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.12 reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.12 reject'                 " "rich_rules.at:45"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.12 reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:46: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.13 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.13 drop'                 " "rich_rules.at:46"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.13 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:47: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.10.10.14 accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.10.10.14 accept'                 " "rich_rules.at:47"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.10.10.14 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:48: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=1  source address=10.10.10.15 accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=1  source address=10.10.10.15 accept'                 " "rich_rules.at:48"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=1  source address=10.10.10.15 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:110: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.20.20.20 accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.20.20.20 accept'                 " "rich_rules.at:110"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.20.20.20 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:111: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-2 destination address=10.20.20.21 accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-2 destination address=10.20.20.21 accept'                 " "rich_rules.at:111"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-2 destination address=10.20.20.21 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:112: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-3 source address=10.20.20.22 destination address=10.20.20.23 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-3 source address=10.20.20.22 destination address=10.20.20.23 drop'                 " "rich_rules.at:112"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-3 source address=10.20.20.22 destination address=10.20.20.23 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:113: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv6 priority=-4 source address=1234::4321 destination address=1234::4444 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv6 priority=-4 source address=1234::4321 destination address=1234::4444 drop'                 " "rich_rules.at:113"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv6 priority=-4 source address=1234::4321 destination address=1234::4444 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }


























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:138: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-1 icmp-type name=\"neighbour-advertisement\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-1 icmp-type name=\"neighbour-advertisement\" accept'                 " "rich_rules.at:138"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-1 icmp-type name="neighbour-advertisement" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:139: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-2 icmp-type name=\"echo-request\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-2 icmp-type name=\"echo-request\" accept'                 " "rich_rules.at:139"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-2 icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }


























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:168: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone HOST                 " "rich_rules.at:168"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:173: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 " "rich_rules.at:173"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:173"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:174: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'                 " "rich_rules.at:174"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:175: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'                 " "rich_rules.at:175"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:175"
$at_failed && at_fn_log_failure
$at_traceon; }

























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:193: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone HOST                 " "rich_rules.at:193"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:193"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:198: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone ANY                 " "rich_rules.at:198"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:198"
$at_failed && at_fn_log_failure
$at_traceon; }

























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:216: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone ANY                 " "rich_rules.at:216"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:221: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source 10.10.10.0/24                 " "rich_rules.at:221"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:222: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone public                 " "rich_rules.at:222"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:222"
$at_failed && at_fn_log_failure
$at_traceon; }

























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:240: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone public                 " "rich_rules.at:240"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:240"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:241: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-source 10.10.10.0/24                 " "rich_rules.at:241"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:241"
$at_failed && at_fn_log_failure
$at_traceon; }














































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:244: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234'                 " "rich_rules.at:244"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:246: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'                 " "rich_rules.at:246"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:252: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface foobar0                 " "rich_rules.at:252"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:253: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone public                 " "rich_rules.at:253"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:254: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'                 " "rich_rules.at:254"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/rich_rules.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:255: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface foobar0                 " "rich_rules.at:255"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:256: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone public                 " "rich_rules.at:256"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }






















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:263: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 " "rich_rules.at:263"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:263"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:267: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=32000 log prefix=\"LOG: \" level=\"warning\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=32000 log prefix=\"LOG: \" level=\"warning\"'                 " "rich_rules.at:267"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=32000 log prefix="LOG: " level="warning"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:268: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=32001 audit accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=32001 audit accept'                 " "rich_rules.at:268"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=32001 audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }

























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:291: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-rich-rule='rule priority=32000 log prefix=\"LOG: \" level=\"warning\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-rich-rule='rule priority=32000 log prefix=\"LOG: \" level=\"warning\"'                 " "rich_rules.at:291"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-rich-rule='rule priority=32000 log prefix="LOG: " level="warning"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:291"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:292: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-rich-rule='rule priority=32001 audit accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-rich-rule='rule priority=32001 audit accept'                 " "rich_rules.at:292"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-rich-rule='rule priority=32001 audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }

















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:297: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=32000 nflog prefix=\"NFLOG: \" queue-size=10'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=32000 nflog prefix=\"NFLOG: \" queue-size=10'                 " "rich_rules.at:297"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=32000 nflog prefix="NFLOG: " queue-size=10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:297"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:298: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=32001 audit accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=32001 audit accept'                 " "rich_rules.at:298"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=32001 audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:298"
$at_failed && at_fn_log_failure
$at_traceon; }













































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_51
#AT_START_52
at_fn_group_banner 52 'icmp_blocks.at:1' \
  "ICMP blocks" "                                    " 2
at_xfail=no
(
  $as_echo "52. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "icmp_blocks.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "icmp_blocks.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:5: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 " "icmp_blocks.at:5"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 " "icmp_blocks.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:9: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block echo-request                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block echo-request                 " "icmp_blocks.at:9"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:10: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block echo-reply                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block echo-reply                 " "icmp_blocks.at:10"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:11: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block redirect                 " "icmp_blocks.at:11"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:12: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"'                 " "icmp_blocks.at:12"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:15: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-request                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-request                 " "icmp_blocks.at:15"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:16: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-reply                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-reply                 " "icmp_blocks.at:16"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:17: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block redirect                 " "icmp_blocks.at:17"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:18: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"'                 " "icmp_blocks.at:18"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:62: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-icmp-block echo-request                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-icmp-block echo-request                 " "icmp_blocks.at:62"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:63: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-request                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-request                 " "icmp_blocks.at:63"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:64: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-reply                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-reply                 " "icmp_blocks.at:64"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:65: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-icmp-block echo-reply                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-icmp-block echo-reply                 " "icmp_blocks.at:65"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:66: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-icmp-block redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-icmp-block redirect                 " "icmp_blocks.at:66"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:67: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"'                 " "icmp_blocks.at:67"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:67: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"'                 " "icmp_blocks.at:67"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }
























































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:141: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block dummy                 " "icmp_blocks.at:141"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }



































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:143: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"dummy\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"dummy\"'                 " "icmp_blocks.at:143"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }























      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_52
#AT_START_53
at_fn_group_banner 53 'rich_tcp_mss_clamp.at:5' \
  "tcp-mss-clamp" "                                  " 2
at_xfail=no
(
  $as_echo "53. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






{ set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:8: mkdir -p ./zones"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:8"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }


cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp value="536"/>
  </rule>
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:20: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "rich_tcp_mss_clamp.at:20"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }






cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp value="pmtu"/>
  </rule>
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:32: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "rich_tcp_mss_clamp.at:32"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }






cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp value="thisdoesnotexist"/>
  </rule>
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:44: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "rich_tcp_mss_clamp.at:44"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: INVALID_RULE: thisdoesnotexist: rule tcp-mss-clamp value=\"thisdoesnotexist\"
WARNING: INVALID_RULE: thisdoesnotexist: rule tcp-mss-clamp value=\"thisdoesnotexist\"
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }






cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp/>
  </rule>
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:62: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "rich_tcp_mss_clamp.at:62"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }






cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <rule>
    <tcp-mss-clamp value="None"/>
  </rule>
</zone>
_ATEOF

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:75: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "rich_tcp_mss_clamp.at:75"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:76: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --zone tcp --add-service http"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --zone tcp --add-service http" "rich_tcp_mss_clamp.at:76"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --zone tcp --add-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:77: cat ./zones/tcp.xml"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:77"
( $at_check_trace; cat ./zones/tcp.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<?xml version=\"1.0\" encoding=\"utf-8\"?>
<zone>
  <service name=\"ssh\"/>
  <service name=\"http\"/>
  <rule>
    <tcp-mss-clamp/>
  </rule>
</zone>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:89: rm ./zones/tcp.xml"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:89"
( $at_check_trace; rm ./zones/tcp.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:90: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist'                 " "rich_tcp_mss_clamp.at:90"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:91: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp'                 " "rich_tcp_mss_clamp.at:91"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:94: cat ./zones/public.xml"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:94"
( $at_check_trace; cat ./zones/public.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<?xml version=\"1.0\" encoding=\"utf-8\"?>
<zone>
  <short>Public</short>
  <description>For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.</description>
  <service name=\"ssh\"/>
  <service name=\"dhcpv6-client\"/>
  <rule>
    <tcp-mss-clamp/>
  </rule>
  <forward/>
</zone>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:107: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule tcp-mss-clamp'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule tcp-mss-clamp'                 " "rich_tcp_mss_clamp.at:107"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:108: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=0'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=0'                 " "rich_tcp_mss_clamp.at:108"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=0'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:108"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:109: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=536'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=536'                 " "rich_tcp_mss_clamp.at:109"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=536'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:110: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=pmtu'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=pmtu'                 " "rich_tcp_mss_clamp.at:110"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=pmtu'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }





























































































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_53
#AT_START_54
at_fn_group_banner 54 'rich_destination_ipset.at:1' \
  "rich destination ipset" "                         " 2
at_xfail=no
(
  $as_echo "54. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rich_destination_ipset.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=mypolicy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=mypolicy                 " "rich_destination_ipset.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=mypolicy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:5: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=mypolicy --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=mypolicy --add-ingress-zone ANY                 " "rich_destination_ipset.at:5"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=mypolicy --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=mypolicy --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=mypolicy --add-egress-zone HOST                 " "rich_destination_ipset.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=mypolicy --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:8: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip                 " "rich_destination_ipset.at:8"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:12: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'                 " "rich_destination_ipset.at:12"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:29: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'                 " "rich_destination_ipset.at:29"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }








































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:43: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'                 " "rich_destination_ipset.at:43"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:45: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'                 " "rich_destination_ipset.at:45"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:47: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'                 " "rich_destination_ipset.at:47"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:49: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'                 " "rich_destination_ipset.at:49"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }





















      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_54
#AT_START_55
at_fn_group_banner 55 'zone.at:1' \
  "zone - target" "                                  " 2
at_xfail=no
(
  $as_echo "55. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone=foobar                 " "zone.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=default                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=default                 " "zone.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:7: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT                 " "zone.at:7"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:8: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DROP                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DROP                 " "zone.at:8"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:9: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=%%REJECT%%                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=%%REJECT%%                 " "zone.at:9"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=%%REJECT%%
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:10: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=CONTINUE                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=CONTINUE                 " "zone.at:10"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=CONTINUE
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/zone.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:11: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DENY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DENY                 " "zone.at:11"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DENY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/zone.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:13: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT                 " "zone.at:13"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:14: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --add-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --add-interface foobar0                 " "zone.at:14"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }






















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:133: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=default                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=default                 " "zone.at:133"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }









































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_55
#AT_START_56
at_fn_group_banner 56 'rpfilter.at:1' \
  "rpfilter" "                                       " 2
at_xfail=no
(
  $as_echo "56. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rpfilter.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rpfilter.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rpfilter.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rpfilter.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi







    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :





    else
        :





    fi








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_56
#AT_START_57
at_fn_group_banner 57 'zone_combine.at:1' \
  "zone - combine" "                                 " 2
at_xfail=no
(
  $as_echo "57. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone_combine.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone_combine.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone_combine.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi







{ set +x
$as_echo "$at_srcdir/zone_combine.at:8: mkdir -p ./zones/combined"
at_fn_check_prepare_trace "zone_combine.at:8"
( $at_check_trace; mkdir -p ./zones/combined
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

cat >./zones/combined/zone1.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<service name="ssh" />
</zone>
_ATEOF

cat >./zones/combined/zone2.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<service name="https" />
</zone>
_ATEOF

cat >./zones/combined/zone3.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port port="12345" protocol="tcp" />
</zone>
_ATEOF








































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_combine.at:51: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones                 " "zone_combine.at:51"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "block combined/zone1 combined/zone2 combined/zone3 dmz drop external home internal public trusted work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_combine.at:54: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone combined/zone1 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:54"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone combined/zone1 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined/zone1
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_combine.at:72: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone combined/zone2 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:72"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone combined/zone2 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined/zone2
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: https
ports:
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_combine.at:90: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone combined/zone3 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:90"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone combined/zone3 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined/zone3
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services:
ports: 12345/tcp
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }
















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_combine.at:133: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone combined/zone2 --add-protocol icmp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone combined/zone2 --add-protocol icmp                 " "zone_combine.at:133"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone combined/zone2 --add-protocol icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_combine.at:134: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone combined/zone1 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:134"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone combined/zone1 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined/zone1
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_combine.at:152: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone combined/zone2 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:152"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone combined/zone2 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined/zone2
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: https
ports:
protocols: icmp
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:152"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_combine.at:170: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone combined/zone3 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:170"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone combined/zone3 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined/zone3
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services:
ports: 12345/tcp
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_57
#AT_START_58
at_fn_group_banner 58 'ipset_defer_native_ipset_creation.at:1' \
  "ipset defer native creation" "                    " 2
at_xfail=no
(
  $as_echo "58. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi
























    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset foobar --type hash:net                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset foobar --type hash:net                 " "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset foobar --type hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset foobar --add-entry 10.0.0.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset foobar --add-entry 10.0.0.0/24                 " "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset foobar --add-entry 10.0.0.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

















































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset foobar                 " "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset foobar --type hash:net                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset foobar --type hash:net                 " "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset foobar --type hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset foobar --add-entry 10.0.0.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset foobar --add-entry 10.0.0.0/24                 " "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset foobar --add-entry 10.0.0.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset foobar                 " "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset foobar --type hash:net                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset foobar --type hash:net                 " "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset foobar --type hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset foobar --add-entry 10.0.0.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset foobar --add-entry 10.0.0.0/24                 " "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset foobar --add-entry 10.0.0.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }























































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_58
#AT_START_59
at_fn_group_banner 59 'reset_defaults.at:1' \
  "reset defaults" "                                 " 2
at_xfail=no
(
  $as_echo "59. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/reset_defaults.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/reset_defaults.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "reset_defaults.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --reset-to-defaults"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --reset-to-defaults" "reset_defaults.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --reset-to-defaults
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --reset-to-defaults"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --reset-to-defaults" "reset_defaults.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --reset-to-defaults
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:8: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service zzzzzzzzzzzz                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service zzzzzzzzzzzz                 " "reset_defaults.at:8"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service zzzzzzzzzzzz
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:9: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service ftp --add-port 22/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service ftp --add-port 22/udp                 " "reset_defaults.at:9"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service ftp --add-port 22/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:11: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-service zzzzzzzzzzzz                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-service zzzzzzzzzzzz                 " "reset_defaults.at:11"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-service zzzzzzzzzzzz
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:12: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-service ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-service ftp                 " "reset_defaults.at:12"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:13: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper ftp --set-short \"FTP HELPER\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper ftp --set-short \"FTP HELPER\"                 " "reset_defaults.at:13"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper ftp --set-short "FTP HELPER"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:14: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --set-short test_short                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --set-short test_short                 " "reset_defaults.at:14"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --set-short test_short
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:15: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset test-ipset --type hash:ip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset test-ipset --type hash:ip                 " "reset_defaults.at:15"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset test-ipset --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:16: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype test-icmptype                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype test-icmptype                 " "reset_defaults.at:16"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype test-icmptype
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:18: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service zzzzzzzzzzzz                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service zzzzzzzzzzzz                 " "reset_defaults.at:18"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service zzzzzzzzzzzz
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:19: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --query-service ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --query-service ftp                 " "reset_defaults.at:19"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:20: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper ftp --get-short                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper ftp --get-short                 " "reset_defaults.at:20"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper ftp --get-short
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo >>"$at_stdout"; $as_echo "FTP HELPER
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:22: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --get-short                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --get-short                 " "reset_defaults.at:22"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --get-short
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo >>"$at_stdout"; $as_echo "test_short
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:24: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-ipset test-ipset                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-ipset test-ipset                 " "reset_defaults.at:24"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-ipset test-ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:25: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-icmptype test-icmptype                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-icmptype test-icmptype                 " "reset_defaults.at:25"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-icmptype test-icmptype
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }








































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:35: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --reset-to-defaults"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --reset-to-defaults" "reset_defaults.at:35"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --reset-to-defaults
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:37: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service zzzzzzzzzzzz                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service zzzzzzzzzzzz                 " "reset_defaults.at:37"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service zzzzzzzzzzzz
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/reset_defaults.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:38: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --query-service ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --query-service ftp                 " "reset_defaults.at:38"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/reset_defaults.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:39: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper ftp --get-short                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper ftp --get-short                 " "reset_defaults.at:39"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper ftp --get-short
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:41: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --get-short                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --get-short                 " "reset_defaults.at:41"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --get-short
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo >>"$at_stdout"; $as_echo "Allow host IPv6
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:43: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-ipset test-ipset                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-ipset test-ipset                 " "reset_defaults.at:43"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-ipset test-ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 135 $at_status "$at_srcdir/reset_defaults.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/reset_defaults.at:44: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-icmptype test-icmptype                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-icmptype test-icmptype                 " "reset_defaults.at:44"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-icmptype test-icmptype
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/reset_defaults.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }





























































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_59
#AT_START_60
at_fn_group_banner 60 'zone_priority.at:1' \
  "zone - priority" "                                " 2
at_xfail=no
(
  $as_echo "60. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone_priority.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone_priority.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone_priority.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone foobar                 " "zone_priority.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:7: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority -32769                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority -32769                 " "zone_priority.at:7"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority -32769
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:8: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority -32768                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority -32768                 " "zone_priority.at:8"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority -32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:9: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority  32768                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority  32768                 " "zone_priority.at:9"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority  32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:10: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority  32767                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority  32767                 " "zone_priority.at:10"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority  32767
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:11: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority -32769                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority -32769                 " "zone_priority.at:11"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority -32769
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:12: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority -32768                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority -32768                 " "zone_priority.at:12"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority -32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:13: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority  32768                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority  32768                 " "zone_priority.at:13"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority  32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:14: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority  32767                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority  32767                 " "zone_priority.at:14"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority  32767
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:15: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority -32769                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority -32769                 " "zone_priority.at:15"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority -32769
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:16: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority -32768                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority -32768                 " "zone_priority.at:16"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority -32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:17: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority  32768                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority  32768                 " "zone_priority.at:17"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority  32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:18: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority  32767                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority  32767                 " "zone_priority.at:18"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority  32767
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:19: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority 0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority 0                 " "zone_priority.at:19"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:20: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority 0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority 0                 " "zone_priority.at:20"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:21: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority 0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority 0                 " "zone_priority.at:21"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:24: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --get-ingress-priority                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --get-ingress-priority                 " "zone_priority.at:24"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --get-ingress-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:25: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --set-ingress-priority 0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --set-ingress-priority 0                 " "zone_priority.at:25"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --set-ingress-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:26: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --get-egress-priority                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --get-egress-priority                 " "zone_priority.at:26"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --get-egress-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:27: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --set-egress-priority 0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --set-egress-priority 0                 " "zone_priority.at:27"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --set-egress-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:30: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --set-priority -1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --set-priority -1                 " "zone_priority.at:30"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:31: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --set-ingress-priority -2                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --set-ingress-priority -2                 " "zone_priority.at:31"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --set-ingress-priority -2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:32: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --set-egress-priority -3                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --set-egress-priority -3                 " "zone_priority.at:32"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --set-egress-priority -3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:33: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --set-priority 0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --set-priority 0                 " "zone_priority.at:33"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --set-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:36: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority 123                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority 123                 " "zone_priority.at:36"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority 123
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:37: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --get-priority                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --get-priority                 " "zone_priority.at:37"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "123
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:40: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority 456                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority 456                 " "zone_priority.at:40"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority 456
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:41: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --get-ingress-priority                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --get-ingress-priority                 " "zone_priority.at:41"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --get-ingress-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "456
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:44: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority 789                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority 789                 " "zone_priority.at:44"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority 789
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:45: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --get-egress-priority                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --get-egress-priority                 " "zone_priority.at:45"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --get-egress-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "789
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:50: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority 666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority 666                 " "zone_priority.at:50"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority 666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:51: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority 666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority 666                 " "zone_priority.at:51"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority 666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:52: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority -1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority -1                 " "zone_priority.at:52"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:53: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --get-priority                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --get-priority                 " "zone_priority.at:53"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-1
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:58: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority -2                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority -2                 " "zone_priority.at:58"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-ingress-priority -2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:59: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority -3                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority -3                 " "zone_priority.at:59"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --set-egress-priority -3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:60: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --get-priority                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --get-priority                 " "zone_priority.at:60"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone foobar --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:63: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-zone foobar | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_priority.at:63"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-zone foobar | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "foobar
target: default
ingress-priority: -2
egress-priority: -3
icmp-block-inversion: no
interfaces:
sources:
services:
ports:
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:83: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-1                 " "zone_priority.at:83"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:84: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-1 --set-priority -30000                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-1 --set-priority -30000                 " "zone_priority.at:84"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-1 --set-priority -30000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:85: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-1 --add-interface dummy-1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-1 --add-interface dummy-1                 " "zone_priority.at:85"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-1 --add-interface dummy-1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:86: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-2                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-2                 " "zone_priority.at:86"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:87: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-2 --set-priority -10000                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-2 --set-priority -10000                 " "zone_priority.at:87"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-2 --set-priority -10000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:88: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-2 --add-interface dummy-2                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-2 --add-interface dummy-2                 " "zone_priority.at:88"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-2 --add-interface dummy-2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:89: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-3                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-3                 " "zone_priority.at:89"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:90: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-3 --set-ingress-priority -5000                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-3 --set-ingress-priority -5000                 " "zone_priority.at:90"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-3 --set-ingress-priority -5000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:91: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-3 --set-egress-priority -2000                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-3 --set-egress-priority -2000                 " "zone_priority.at:91"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-3 --set-egress-priority -2000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:92: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-3 --add-interface dummy-3                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-3 --add-interface dummy-3                 " "zone_priority.at:92"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-3 --add-interface dummy-3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:93: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-4                 " "zone_priority.at:93"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:94: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-4 --set-ingress-priority -100                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-4 --set-ingress-priority -100                 " "zone_priority.at:94"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-4 --set-ingress-priority -100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:95: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-4 --set-egress-priority 1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-4 --set-egress-priority 1                 " "zone_priority.at:95"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-4 --set-egress-priority 1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:96: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-4 --add-interface dummy-4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-4 --add-interface dummy-4                 " "zone_priority.at:96"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-4 --add-interface dummy-4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:97: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-5                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-5                 " "zone_priority.at:97"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:98: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-5 --set-ingress-priority -1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-5 --set-ingress-priority -1                 " "zone_priority.at:98"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-5 --set-ingress-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:99: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-5 --set-egress-priority 100                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-5 --set-egress-priority 100                 " "zone_priority.at:99"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-5 --set-egress-priority 100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:100: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-5 --add-interface dummy-5                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-5 --add-interface dummy-5                 " "zone_priority.at:100"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-5 --add-interface dummy-5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:101: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-6                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-6                 " "zone_priority.at:101"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:102: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-6 --set-priority 500                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-6 --set-priority 500                 " "zone_priority.at:102"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-6 --set-priority 500
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:103: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-6 --add-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-6 --add-source 10.10.10.0/24                 " "zone_priority.at:103"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-6 --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:104: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-7                 " "zone_priority.at:104"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:105: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-7 --set-priority 1000                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-7 --set-priority 1000                 " "zone_priority.at:105"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-7 --set-priority 1000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:106: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-7 --add-interface dummy-7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-7 --add-interface dummy-7                 " "zone_priority.at:106"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-7 --add-interface dummy-7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:107: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-8                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-8                 " "zone_priority.at:107"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:108: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-8 --set-priority 30000                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-8 --set-priority 30000                 " "zone_priority.at:108"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-8 --set-priority 30000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:108"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:109: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-8 --add-source 10.0.0.0/8                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-8 --add-source 10.0.0.0/8                 " "zone_priority.at:109"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-8 --add-source 10.0.0.0/8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:110: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-0andlast                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-0andlast                 " "zone_priority.at:110"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone zone-0andlast
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:111: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-0andlast --set-ingress-priority 0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-0andlast --set-ingress-priority 0                 " "zone_priority.at:111"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-0andlast --set-ingress-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:112: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-0andlast --set-egress-priority 32000                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-0andlast --set-egress-priority 32000                 " "zone_priority.at:112"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-0andlast --set-egress-priority 32000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone_priority.at:113: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-0andlast --add-interface dummy-9                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-0andlast --add-interface dummy-9                 " "zone_priority.at:113"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone zone-0andlast --add-interface dummy-9
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }


















































































{ set +x
$as_echo "$at_srcdir/zone_priority.at:791: cat ./zones/zone-5.xml"
at_fn_check_prepare_trace "zone_priority.at:791"
( $at_check_trace; cat ./zones/zone-5.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<?xml version=\"1.0\" encoding=\"utf-8\"?>
<zone ingress-priority=\"-1\" egress-priority=\"100\">
  <interface name=\"dummy-5\"/>
</zone>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:791"
$at_failed && at_fn_log_failure
$at_traceon; }



















































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_60
#AT_START_61
at_fn_group_banner 61 'firewall-offline-cmd.at:19' \
  "lokkit migration" "                               " 2
at_xfail=no
(
  $as_echo "61. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:19: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-offline-cmd.at:19"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:19: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-offline-cmd.at:19"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:23: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --addmodule=abc --addmodule=efg --removemodule=xyz         --trust=eth+ --trust=em0         --masq=tun+ --masq=tap+ --port=7:tcp --port=666:udp         --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config         --service=dns --service=ftp --remove-service=dhcpv6-client         --block-icmp=router-advertisement --block-icmp=router-solicitation         --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4         --forward-port=if=ippp+:port=333:proto=udp:toport=444"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --addmodule=abc --addmodule=efg --removemodule=xyz         --trust=eth+ --trust=em0         --masq=tun+ --masq=tap+ --port=7:tcp --port=666:udp         --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config         --service=dns --service=ftp --remove-service=dhcpv6-client         --block-icmp=router-advertisement --block-icmp=router-solicitation         --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4         --forward-port=if=ippp+:port=333:proto=udp:toport=444" "firewall-offline-cmd.at:23"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --addmodule=abc --addmodule=efg --removemodule=xyz         --trust=eth+ --trust=em0         --masq=tun+ --masq=tap+ --port=7:tcp --port=666:udp         --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config         --service=dns --service=ftp --remove-service=dhcpv6-client         --block-icmp=router-advertisement --block-icmp=router-solicitation         --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4         --forward-port=if=ippp+:port=333:proto=udp:toport=444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:31: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+" "firewall-offline-cmd.at:31"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:32: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0" "firewall-offline-cmd.at:32"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:33: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns" "firewall-offline-cmd.at:33"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:34: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp" "firewall-offline-cmd.at:34"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:35: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client" "firewall-offline-cmd.at:35"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-offline-cmd.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:36: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement" "firewall-offline-cmd.at:36"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:37: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation" "firewall-offline-cmd.at:37"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:38: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4" "firewall-offline-cmd.at:38"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:39: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444" "firewall-offline-cmd.at:39"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }






        { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:42: cat << EOF > ./system-config-firewall
        --addmodule=abc
        --addmodule=efg
        --removemodule=xyz
        --trust=eth+
        --trust=em0
        --masq=tun+
        --masq=tap+
        --port=7:tcp
        --port=666:udp
        --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config
        --service=dns
        --service=ftp
        --remove-service=dhcpv6-client
        --block-icmp=router-advertisement
        --block-icmp=router-solicitation
        --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4
        --forward-port=if=ippp+:port=333:proto=udp:toport=444
EOF
    "
at_fn_check_prepare_notrace 'an embedded newline' "firewall-offline-cmd.at:42"
( $at_check_trace; cat << EOF > ./system-config-firewall
        --addmodule=abc
        --addmodule=efg
        --removemodule=xyz
        --trust=eth+
        --trust=em0
        --masq=tun+
        --masq=tap+
        --port=7:tcp
        --port=666:udp
        --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config
        --service=dns
        --service=ftp
        --remove-service=dhcpv6-client
        --block-icmp=router-advertisement
        --block-icmp=router-solicitation
        --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4
        --forward-port=if=ippp+:port=333:proto=udp:toport=444
EOF

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }











    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:62: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --migrate-system-config-firewall=./system-config-firewall"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --migrate-system-config-firewall=./system-config-firewall" "firewall-offline-cmd.at:62"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --migrate-system-config-firewall=./system-config-firewall
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:63: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+" "firewall-offline-cmd.at:63"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:64: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0" "firewall-offline-cmd.at:64"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:65: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns" "firewall-offline-cmd.at:65"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:66: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp" "firewall-offline-cmd.at:66"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:67: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client" "firewall-offline-cmd.at:67"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-offline-cmd.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:68: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement" "firewall-offline-cmd.at:68"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:69: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation" "firewall-offline-cmd.at:69"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:70: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4" "firewall-offline-cmd.at:70"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:71: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444" "firewall-offline-cmd.at:71"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_61
#AT_START_62
at_fn_group_banner 62 'firewalld.conf.at:1' \
  "firewalld.conf" "                                 " 3
at_xfail=no
(
  $as_echo "62. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewalld.conf.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewalld.conf.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewalld.conf.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewalld.conf.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewalld.conf.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewalld.conf.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewalld.conf.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewalld.conf.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewalld.conf.at:1"






    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

   EXPECTED_IPV6_RPFILTER_VALUE=yes

    else
        :

   EXPECTED_IPV6_RPFILTER_VALUE=no

    fi




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

    EXPECTED_INDIVIDUAL_CALLS_VALUE=no

        else
            :

    EXPECTED_INDIVIDUAL_CALLS_VALUE=yes

        fi


    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.GetAll string:\"org.fedoraproject.FirewallD1.config\"               | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     awk 'BEGIN{line_mark=-99; line=0} {line++; if (line == line_mark + 1) {buffer = $0}; if (line == line_mark + 2) {print buffer \" : \" $0} } /^dict entry/{line_mark=line}' | sort "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.GetAll string:"org.fedoraproject.FirewallD1.config"               | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     awk 'BEGIN{line_mark=-99; line=0} {line++; if (line == line_mark + 1) {buffer = $0}; if (line == line_mark + 2) {print buffer " : " $0} } /^dict entry/{line_mark=line}' | sort
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "string \"AllowZoneDrifting\" : variant string \"no\"
string \"AutomaticHelpers\" : variant string \"no\"
string \"CleanupModulesOnExit\" : variant string \"no\"
string \"CleanupOnExit\" : variant string \"yes\"
string \"DefaultZone\" : variant string \"public\"
string \"FirewallBackend\" : variant string \"nftables\"
string \"FlushAllOnReload\" : variant string \"yes\"
string \"IPv6_rpfilter\" : variant string \"${EXPECTED_IPV6_RPFILTER_VALUE}\"
string \"IndividualCalls\" : variant string \"${EXPECTED_INDIVIDUAL_CALLS_VALUE}\"
string \"Lockdown\" : variant string \"no\"
string \"LogDenied\" : variant string \"off\"
string \"MinimalMark\" : variant int32 100
string \"NftablesCounters\" : variant string \"no\"
string \"NftablesFlowtable\" : variant string \"off\"
string \"RFC3964_IPv4\" : variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"MinimalMark\" int32:1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"MinimalMark" int32:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"MinimalMark\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"MinimalMark"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant int32 100
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"AutomaticHelpers\" string:\"yes\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"AutomaticHelpers" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"AutomaticHelpers\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"AutomaticHelpers"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"no\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"Lockdown\" string:\"yes\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"Lockdown" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"Lockdown\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"Lockdown"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"LogDenied\" string:\"all\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"LogDenied" string:"all"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"LogDenied\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"LogDenied"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"all\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"IPv6_rpfilter\" string:\"yes\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"IPv6_rpfilter" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"IPv6_rpfilter\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"IPv6_rpfilter"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"IndividualCalls\" string:\"yes\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"IndividualCalls" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"IndividualCalls\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"IndividualCalls"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"FirewallBackend\" string:\"iptables\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"FirewallBackend" string:"iptables"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"FirewallBackend\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"FirewallBackend"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"iptables\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"FlushAllOnReload\" string:\"no\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"FlushAllOnReload" string:"no"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"FlushAllOnReload\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"FlushAllOnReload"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"no\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"CleanupModulesOnExit\" string:\"yes\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"CleanupModulesOnExit" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"CleanupModulesOnExit\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"CleanupModulesOnExit"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"CleanupOnExit\" string:\"no\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"CleanupOnExit" string:"no"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"CleanupOnExit\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"CleanupOnExit"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"no\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"RFC3964_IPv4\" string:\"no\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"RFC3964_IPv4" string:"no"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"RFC3964_IPv4\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"RFC3964_IPv4"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"no\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"AllowZoneDrifting\" string:\"yes\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"AllowZoneDrifting" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"AllowZoneDrifting\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"AllowZoneDrifting"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"no\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"NftablesCounters\" string:\"yes\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"NftablesCounters" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"NftablesCounters\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"NftablesCounters"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "firewalld.conf.at:59" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewalld.conf.at:59"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_62
#AT_START_63
at_fn_group_banner 63 'service.at:1' \
  "dbus api - services" "                            " 3
at_xfail=no
(
  $as_echo "63. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/service.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/service.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "service.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/service.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "service.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/service.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "service.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/service.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/service.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "service.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/service.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/service.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "service.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "service.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/service.at:1"






    $as_echo "service.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:4"
    $as_echo "service.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:4"

    { set +x
$as_echo "$at_srcdir/service.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addService\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//method[@name="addService"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addService\">
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
<arg direction=\"in\" name=\"settings\" type=\"(sssa(ss)asa{ss}asa(ss))\"></arg>
<arg direction=\"out\" type=\"o\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:11" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:11"

    { set +x
$as_echo "$at_srcdir/service.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService \"foobar\"      '(\"1.0\",        \"foobar\",        \"foobar service is for foobar\",        [(\"1234\", \"udp\"), (\"22\", \"tcp\"), (\"1234\", \"udp\")],        [\"ftp\"],        {\"ipv4\": \"1.2.3.4\"},        [\"icmp\", \"igmp\"],        [(\"4321\", \"tcp\"), (\"4321\", \"udp\")]      )'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService "foobar"      '("1.0",        "foobar",        "foobar service is for foobar",        [("1234", "udp"), ("22", "tcp"), ("1234", "udp")],        ["ftp"],        {"ipv4": "1.2.3.4"},        ["icmp", "igmp"],        [("4321", "tcp"), ("4321", "udp")]      )'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ


    $as_echo "service.at:26" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:26"
    $as_echo "service.at:26" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:26"

    { set +x
$as_echo "$at_srcdir/service.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getSettings\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getSettings"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSettings\">
<arg direction=\"out\" type=\"(sssa(ss)asa{ss}asa(ss))\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:31" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:31"

    { set +x
$as_echo "$at_srcdir/service.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.0', 'foobar', 'foobar service is for foobar', [('1234', 'udp'), ('22', 'tcp')], ['ftp'], {'ipv4': '1.2.3.4'}, ['icmp', 'igmp'], [('4321', 'tcp'), ('4321', 'udp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:35" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:35"
    $as_echo "service.at:35" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:35"

    { set +x
$as_echo "$at_srcdir/service.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"update\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="update"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"update\">
<arg direction=\"in\" name=\"settings\" type=\"(sssa(ss)asa{ss}asa(ss))\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:40" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:40"

    { set +x
$as_echo "$at_srcdir/service.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update '(\"1.1\",        \"foobar new\",        \"foobar new service is for foobar\",        [(\"12345\", \"udp\"), (\"2222\", \"tcp\")],        [\"ftp\"],        {},        [\"icmp\"],        [(\"4321\", \"tcp\")]      )'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update '("1.1",        "foobar new",        "foobar new service is for foobar",        [("12345", "udp"), ("2222", "tcp")],        ["ftp"],        {},        ["icmp"],        [("4321", "tcp")]      )'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:52" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:52"

    { set +x
$as_echo "$at_srcdir/service.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.1', 'foobar new', 'foobar new service is for foobar', [('12345', 'udp'), ('2222', 'tcp')], ['ftp'], @a{ss} {}, ['icmp'], [('4321', 'tcp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:56" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:56"
    $as_echo "service.at:56" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:56"

    { set +x
$as_echo "$at_srcdir/service.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"loadDefaults\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="loadDefaults"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"loadDefaults\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:60" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:60"

    { set +x
$as_echo "$at_srcdir/service.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getServiceByName \"ssh\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getServiceByName "ssh"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ_TEMP=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ_TEMP

    $as_echo "service.at:63" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:63"

    { set +x
$as_echo "$at_srcdir/service.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ_TEMP}                            --method org.fedoraproject.FirewallD1.config.service.setVersion \"1.1\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ_TEMP}                            --method org.fedoraproject.FirewallD1.config.service.setVersion "1.1"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:64" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:64"

    { set +x
$as_echo "$at_srcdir/service.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ_TEMP}                            --method org.fedoraproject.FirewallD1.config.service.loadDefaults ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ_TEMP}                            --method org.fedoraproject.FirewallD1.config.service.loadDefaults ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:65" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:65"

    { set +x
$as_echo "$at_srcdir/service.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getServiceByName \"ssh\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getServiceByName "ssh"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ_TEMP=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ_TEMP

    $as_echo "service.at:68" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:68"

    { set +x
$as_echo "$at_srcdir/service.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ_TEMP}                            --method org.fedoraproject.FirewallD1.config.service.getVersion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ_TEMP}                            --method org.fedoraproject.FirewallD1.config.service.getVersion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:72" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:72"
    $as_echo "service.at:72" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:72"

    { set +x
$as_echo "$at_srcdir/service.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"remove\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="remove"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"remove\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:76" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:76"
    $as_echo "service.at:76" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:76"

    { set +x
$as_echo "$at_srcdir/service.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"rename\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="rename"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"rename\">
<arg direction=\"in\" name=\"name\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:82" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:82"
    $as_echo "service.at:82" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:82"

    { set +x
$as_echo "$at_srcdir/service.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getVersion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getVersion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getVersion\">
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:87" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:87"
    $as_echo "service.at:87" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:87"

    { set +x
$as_echo "$at_srcdir/service.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setVersion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setVersion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setVersion\">
<arg direction=\"in\" name=\"version\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:93" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:93"
    $as_echo "service.at:93" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:93"

    { set +x
$as_echo "$at_srcdir/service.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getShort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getShort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getShort\">
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:98" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:98"
    $as_echo "service.at:98" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:98"

    { set +x
$as_echo "$at_srcdir/service.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setShort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setShort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setShort\">
<arg direction=\"in\" name=\"short\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:104" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:104"
    $as_echo "service.at:104" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:104"

    { set +x
$as_echo "$at_srcdir/service.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getDescription\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getDescription"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getDescription\">
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:109" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:109"
    $as_echo "service.at:109" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:109"

    { set +x
$as_echo "$at_srcdir/service.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setDescription\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setDescription"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setDescription\">
<arg direction=\"in\" name=\"description\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:115" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:115"
    $as_echo "service.at:115" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:115"

    { set +x
$as_echo "$at_srcdir/service.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getPorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getPorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPorts\">
<arg direction=\"out\" type=\"a(ss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:120" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:120"
    $as_echo "service.at:120" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:120"

    { set +x
$as_echo "$at_srcdir/service.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setPorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setPorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setPorts\">
<arg direction=\"in\" name=\"ports\" type=\"a(ss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:125" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:125"
    $as_echo "service.at:125" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:125"

    { set +x
$as_echo "$at_srcdir/service.at:125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addPort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:131" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:131"
    $as_echo "service.at:131" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:131"

    { set +x
$as_echo "$at_srcdir/service.at:131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:131"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:137" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:137"
    $as_echo "service.at:137" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:137"

    { set +x
$as_echo "$at_srcdir/service.at:137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryPort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:137"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:145" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:145"
    $as_echo "service.at:145" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:145"

    { set +x
$as_echo "$at_srcdir/service.at:145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getSourcePorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getSourcePorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSourcePorts\">
<arg direction=\"out\" type=\"a(ss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:145"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:150" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:150"
    $as_echo "service.at:150" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:150"

    { set +x
$as_echo "$at_srcdir/service.at:150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setSourcePorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setSourcePorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setSourcePorts\">
<arg direction=\"in\" name=\"ports\" type=\"a(ss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:150"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:155" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:155"
    $as_echo "service.at:155" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:155"

    { set +x
$as_echo "$at_srcdir/service.at:155:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addSourcePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:155"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addSourcePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addSourcePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:155"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:161" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:161"
    $as_echo "service.at:161" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:161"

    { set +x
$as_echo "$at_srcdir/service.at:161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeSourcePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeSourcePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeSourcePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:161"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:167" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:167"
    $as_echo "service.at:167" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:167"

    { set +x
$as_echo "$at_srcdir/service.at:167:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"querySourcePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:167"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="querySourcePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"querySourcePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:167"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:175" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:175"
    $as_echo "service.at:175" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:175"

    { set +x
$as_echo "$at_srcdir/service.at:175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getProtocols\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getProtocols"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getProtocols\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:175"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:180" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:180"
    $as_echo "service.at:180" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:180"

    { set +x
$as_echo "$at_srcdir/service.at:180:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setProtocols\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:180"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setProtocols"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setProtocols\">
<arg direction=\"in\" name=\"protocols\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:180"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:185" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:185"
    $as_echo "service.at:185" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:185"

    { set +x
$as_echo "$at_srcdir/service.at:185:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addProtocol\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:185"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addProtocol"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addProtocol\">
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:185"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:190" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:190"
    $as_echo "service.at:190" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:190"

    { set +x
$as_echo "$at_srcdir/service.at:190:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeProtocol\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:190"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeProtocol"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeProtocol\">
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:190"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:195" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:195"
    $as_echo "service.at:195" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:195"

    { set +x
$as_echo "$at_srcdir/service.at:195:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryProtocol\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:195"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryProtocol"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryProtocol\">
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:195"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:202" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:202"
    $as_echo "service.at:202" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:202"

    { set +x
$as_echo "$at_srcdir/service.at:202:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getModules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:202"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getModules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getModules\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:202"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:207" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:207"
    $as_echo "service.at:207" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:207"

    { set +x
$as_echo "$at_srcdir/service.at:207:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setModules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:207"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setModules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setModules\">
<arg direction=\"in\" name=\"modules\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:207"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:212" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:212"
    $as_echo "service.at:212" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:212"

    { set +x
$as_echo "$at_srcdir/service.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addModule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addModule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addModule\">
<arg direction=\"in\" name=\"module\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:217" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:217"
    $as_echo "service.at:217" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:217"

    { set +x
$as_echo "$at_srcdir/service.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeModule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeModule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeModule\">
<arg direction=\"in\" name=\"module\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:222" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:222"
    $as_echo "service.at:222" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:222"

    { set +x
$as_echo "$at_srcdir/service.at:222:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryModule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:222"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryModule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryModule\">
<arg direction=\"in\" name=\"module\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:222"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:229" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:229"
    $as_echo "service.at:229" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:229"

    { set +x
$as_echo "$at_srcdir/service.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getDestinations\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getDestinations"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getDestinations\">
<arg direction=\"out\" type=\"a{ss}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:234" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:234"
    $as_echo "service.at:234" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:234"

    { set +x
$as_echo "$at_srcdir/service.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setDestinations\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setDestinations"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setDestinations\">
<arg direction=\"in\" name=\"destinations\" type=\"a{ss}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:239" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:239"
    $as_echo "service.at:239" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:239"

    { set +x
$as_echo "$at_srcdir/service.at:239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setDestination\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setDestination"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setDestination\">
<arg direction=\"in\" name=\"family\" type=\"s\"></arg>
<arg direction=\"in\" name=\"address\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:245" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:245"
    $as_echo "service.at:245" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:245"

    { set +x
$as_echo "$at_srcdir/service.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getDestination\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getDestination"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getDestination\">
<arg direction=\"in\" name=\"family\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:251" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:251"
    $as_echo "service.at:251" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:251"

    { set +x
$as_echo "$at_srcdir/service.at:251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeDestination\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeDestination"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeDestination\">
<arg direction=\"in\" name=\"family\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:251"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:256" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:256"
    $as_echo "service.at:256" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:256"

    { set +x
$as_echo "$at_srcdir/service.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryDestination\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryDestination"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryDestination\">
<arg direction=\"in\" name=\"family\" type=\"s\"></arg>
<arg direction=\"in\" name=\"address\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:264" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:264"
    $as_echo "service.at:264" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:264"

    { set +x
$as_echo "$at_srcdir/service.at:264:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getIncludes\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:264"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getIncludes"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getIncludes\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:264"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:269" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:269"

    { set +x
$as_echo "$at_srcdir/service.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(@as [],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:272" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:272"
    $as_echo "service.at:272" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:272"

    { set +x
$as_echo "$at_srcdir/service.at:272:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setIncludes\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:272"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setIncludes"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setIncludes\">
<arg direction=\"in\" name=\"includes\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:272"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:277" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:277"

    { set +x
$as_echo "$at_srcdir/service.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.setIncludes '[\"https\", \"ssh\"]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.setIncludes '["https", "ssh"]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:278" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:278"

    { set +x
$as_echo "$at_srcdir/service.at:278:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:278"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['https', 'ssh'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:281" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:281"
    $as_echo "service.at:281" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:281"

    { set +x
$as_echo "$at_srcdir/service.at:281:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addInclude\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:281"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addInclude"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addInclude\">
<arg direction=\"in\" name=\"include\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:281"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:286" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:286"

    { set +x
$as_echo "$at_srcdir/service.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.addInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.addInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:287" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:287"

    { set +x
$as_echo "$at_srcdir/service.at:287:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:287"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:287"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:290" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:290"
    $as_echo "service.at:290" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:290"

    { set +x
$as_echo "$at_srcdir/service.at:290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeInclude\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeInclude"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeInclude\">
<arg direction=\"in\" name=\"include\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:295" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:295"

    { set +x
$as_echo "$at_srcdir/service.at:295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.removeInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.removeInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:296" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:296"
    $as_echo "service.at:296" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:296"

    { set +x
$as_echo "$at_srcdir/service.at:296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryInclude\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryInclude"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryInclude\">
<arg direction=\"in\" name=\"include\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:296"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:302" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:302"

    { set +x
$as_echo "$at_srcdir/service.at:302:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:302"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:302"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service.at:306:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:306"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:306"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service.at:306:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:306"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:306"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "service.at:307" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:307"
    $as_echo "service.at:307" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:307"

    { set +x
$as_echo "$at_srcdir/service.at:307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getServiceSettings\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getServiceSettings"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getServiceSettings\">
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
<arg direction=\"out\" type=\"(sssa(ss)asa{ss}asa(ss))\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:313" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:313"

    { set +x
$as_echo "$at_srcdir/service.at:313:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings \"foobar\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:313"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings "foobar"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.1', 'foobar new', 'foobar new service is for foobar', [('12345', 'udp'), ('2222', 'tcp')], ['ftp'], @a{ss} {}, ['icmp'], [('4321', 'tcp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:313"
$at_failed && at_fn_log_failure
$at_traceon; }







    $as_echo "service.at:324" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:324"

    { set +x
$as_echo "$at_srcdir/service.at:324:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService \"foobar-old\"      '(\"1.0\",        \"foobar-old\",        \"foobar-old service is for foobar-old\",        [(\"1234\", \"udp\"), (\"22\", \"tcp\"), (\"1234\", \"udp\")],        [\"ftp\"],        {},        [],        [(\"4321\", \"tcp\"), (\"4321\", \"udp\")]      )'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:324"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService "foobar-old"      '("1.0",        "foobar-old",        "foobar-old service is for foobar-old",        [("1234", "udp"), ("22", "tcp"), ("1234", "udp")],        ["ftp"],        {},        [],        [("4321", "tcp"), ("4321", "udp")]      )'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:324"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ

    $as_echo "service.at:338" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:338"

    { set +x
$as_echo "$at_srcdir/service.at:338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{\"version\": <\"1.1\">,
       \"includes\": <[\"https\"]>,
       \"protocols\": <[\"icmp\"]>
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{"version": <"1.1">,
       "includes": <["https"]>,
       "protocols": <["icmp"]>
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:338"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:345" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:345"

    { set +x
$as_echo "$at_srcdir/service.at:345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.1', 'foobar-old', 'foobar-old service is for foobar-old', [('1234', 'udp'), ('22', 'tcp')], ['ftp'], @a{ss} {}, ['icmp'], [('4321', 'tcp'), ('4321', 'udp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:345"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:348" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:348"

    { set +x
$as_echo "$at_srcdir/service.at:348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-old service is for foobar-old'>
'includes': <['https']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp']>
'short': <'foobar-old'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.1'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:348"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "service.at:360" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:360"

    { set +x
$as_echo "$at_srcdir/service.at:360:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings \"foobar-old\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:360"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings "foobar-old"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.1', 'foobar-old', 'foobar-old service is for foobar-old', [('1234', 'udp'), ('22', 'tcp')], ['ftp'], @a{ss} {}, ['icmp'], [('4321', 'tcp'), ('4321', 'udp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:360"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:363" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:363"

    { set +x
$as_echo "$at_srcdir/service.at:363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings2 \"foobar-old\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings2 "foobar-old"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-old service is for foobar-old'>
'includes': <['https']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp']>
'short': <'foobar-old'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.1'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:363"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:375" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:375"
    $as_echo "service.at:375" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:375"

    { set +x
$as_echo "$at_srcdir/service.at:375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addService2\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//method[@name="addService2"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addService2\">
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"></arg>
<arg direction=\"out\" type=\"o\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:382" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:382"

    { set +x
$as_echo "$at_srcdir/service.at:382:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService2 \"foobar-dict\"      '{\"version\": <\"1.0\">,
       \"short\": <\"foobar-dict\">,
       \"description\": <\"foobar-dict service is for foobar-dict\">,
       \"ports\": <[(\"1234\", \"udp\"), (\"22\", \"tcp\"), (\"1234\", \"udp\")]>,
       \"modules\": <[\"ftp\"]>,
       \"destination\": <{\"ipv6\": \"1234::4321\"}>,
       \"protocols\": <[\"icmp\", \"igmp\"]>,
       \"source_ports\": <[(\"4321\", \"tcp\"), (\"4321\", \"udp\")]>,
       \"includes\": <[\"https\", \"samba\"]>,
       \"helpers\": <[\"ftp\"]>
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:382"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService2 "foobar-dict"      '{"version": <"1.0">,
       "short": <"foobar-dict">,
       "description": <"foobar-dict service is for foobar-dict">,
       "ports": <[("1234", "udp"), ("22", "tcp"), ("1234", "udp")]>,
       "modules": <["ftp"]>,
       "destination": <{"ipv6": "1234::4321"}>,
       "protocols": <["icmp", "igmp"]>,
       "source_ports": <[("4321", "tcp"), ("4321", "udp")]>,
       "includes": <["https", "samba"]>,
       "helpers": <["ftp"]>
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:382"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ


    $as_echo "service.at:399" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:399"
    $as_echo "service.at:399" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:399"

    { set +x
$as_echo "$at_srcdir/service.at:399:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getSettings2\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:399"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getSettings2"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSettings2\">
<arg direction=\"out\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:399"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:404" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:404"

    { set +x
$as_echo "$at_srcdir/service.at:404:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:404"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-dict service is for foobar-dict'>
'destination': <{'ipv6': '1234::4321'}>
'helpers': <['ftp']>
'includes': <['https', 'samba']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp', 'igmp']>
'short': <'foobar-dict'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.0'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:404"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:418" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:418"
    $as_echo "service.at:418" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:418"

    { set +x
$as_echo "$at_srcdir/service.at:418:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"update2\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:418"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="update2"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"update2\">
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:418"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:423" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:423"

    { set +x
$as_echo "$at_srcdir/service.at:423:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{\"version\": <\"1.1\">,
       \"includes\": <[\"https\", \"samba\", \"http\"]>
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:423"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{"version": <"1.1">,
       "includes": <["https", "samba", "http"]>
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:423"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:428" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:428"

    { set +x
$as_echo "$at_srcdir/service.at:428:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:428"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-dict service is for foobar-dict'>
'destination': <{'ipv6': '1234::4321'}>
'helpers': <['ftp']>
'includes': <['https', 'samba', 'http']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp', 'igmp']>
'short': <'foobar-dict'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.1'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:428"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:442" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:442"

    { set +x
$as_echo "$at_srcdir/service.at:442:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{\"version\": <\"1.2\">,
       \"includes\": <@as []>
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:442"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{"version": <"1.2">,
       "includes": <@as []>
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:442"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:447" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:447"

    { set +x
$as_echo "$at_srcdir/service.at:447:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:447"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-dict service is for foobar-dict'>
'destination': <{'ipv6': '1234::4321'}>
'helpers': <['ftp']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp', 'igmp']>
'short': <'foobar-dict'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.2'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:447"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service.at:459:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:459"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service.at:459:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:459"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "service.at:460" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:460"
    $as_echo "service.at:460" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:460"

    { set +x
$as_echo "$at_srcdir/service.at:460:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getServiceSettings2\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:460"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getServiceSettings2"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getServiceSettings2\">
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
<arg direction=\"out\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:460"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:466" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:466"

    { set +x
$as_echo "$at_srcdir/service.at:466:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings2 \"foobar-dict\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:466"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings2 "foobar-dict"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-dict service is for foobar-dict'>
'destination': <{'ipv6': '1234::4321'}>
'helpers': <['ftp']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp', 'igmp']>
'short': <'foobar-dict'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.2'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:466"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:479" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:479"

    { set +x
$as_echo "$at_srcdir/service.at:479:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{\"version\": <\"1.3\">,
       \"thisdoesnotexist\": <\"\">
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:479"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{"version": <"1.3">,
       "thisdoesnotexist": <"">
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service.at:479"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_OPTION: option/d'" != x"ignore"; then
            $as_echo "service.at:485" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_OPTION: option/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/service.at:485"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_63
#AT_START_64
at_fn_group_banner 64 'zone_permanent_signatures.at:1' \
  "dbus api - zone permanent signatures" "           " 3
at_xfail=no
(
  $as_echo "64. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_signatures.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone_permanent_signatures.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_permanent_signatures.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_signatures.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "zone_permanent_signatures.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_permanent_signatures.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_permanent_signatures.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "zone_permanent_signatures.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_permanent_signatures.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "zone_permanent_signatures.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/zone_permanent_signatures.at:1"







    $as_echo "zone_permanent_signatures.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:8"
    $as_echo "zone_permanent_signatures.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:8"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"listZones\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="listZones"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"listZones\">
<arg direction=\"out\" type=\"ao\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:13" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:13"
    $as_echo "zone_permanent_signatures.at:13" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:13"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"getZoneNames\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="getZoneNames"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getZoneNames\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:18" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:18"
    $as_echo "zone_permanent_signatures.at:18" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:18"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"getZoneByName\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="getZoneByName"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getZoneByName\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"o\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:24" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:24"
    $as_echo "zone_permanent_signatures.at:24" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:24"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"addZone\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="addZone"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addZone\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"settings\" type=\"(sssbsasa(ss)asba(ssss)asasasasa(ss)b)\"></arg>
<arg direction=\"out\" type=\"o\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:33" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:33"
    $as_echo "zone_permanent_signatures.at:33" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:33"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"getZoneOfInterface\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="getZoneOfInterface"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getZoneOfInterface\">
<arg direction=\"in\" name=\"iface\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:39" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:39"
    $as_echo "zone_permanent_signatures.at:39" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:39"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"getZoneOfSource\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="getZoneOfSource"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getZoneOfSource\">
<arg direction=\"in\" name=\"source\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    $as_echo "zone_permanent_signatures.at:52" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:52"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }



DBUS_PUBLIC_ZONE_OBJ=$(sed -e "s/.*config\/zone\/\([^']\+\)['].*/\1/" ./stdout)
export DBUS_PUBLIC_ZONE_OBJ


    $as_echo "zone_permanent_signatures.at:56" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:56"
    $as_echo "zone_permanent_signatures.at:56" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:56"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getSettings\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getSettings"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSettings\">
<arg direction=\"out\" type=\"(sssbsasa(ss)asba(ssss)asasasasa(ss)b)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:62" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:62"
    $as_echo "zone_permanent_signatures.at:62" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:62"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"update\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="update"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"update\">
<arg direction=\"in\" name=\"settings\" type=\"(sssbsasa(ss)asba(ssss)asasasasa(ss)b)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:67" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:67"
    $as_echo "zone_permanent_signatures.at:67" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:67"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//signal[@name=\"Updated\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//signal[@name="Updated"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"Updated\">
<arg name=\"name\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:73" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:73"
    $as_echo "zone_permanent_signatures.at:73" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:73"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"loadDefaults\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="loadDefaults"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"loadDefaults\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:78" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:78"
    $as_echo "zone_permanent_signatures.at:78" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:78"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"remove\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="remove"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"remove\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:82" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:82"
    $as_echo "zone_permanent_signatures.at:82" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:82"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//signal[@name=\"Removed\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//signal[@name="Removed"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"Removed\">
<arg name=\"name\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:88" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:88"
    $as_echo "zone_permanent_signatures.at:88" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:88"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"rename\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="rename"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"rename\">
<arg direction=\"in\" name=\"name\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:93" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:93"
    $as_echo "zone_permanent_signatures.at:93" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:93"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//signal[@name=\"Renamed\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//signal[@name="Renamed"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"Renamed\">
<arg name=\"name\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:101" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:101"
    $as_echo "zone_permanent_signatures.at:101" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:101"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getVersion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getVersion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getVersion\">
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:106" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:106"
    $as_echo "zone_permanent_signatures.at:106" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:106"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setVersion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setVersion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setVersion\">
<arg direction=\"in\" name=\"version\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:114" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:114"
    $as_echo "zone_permanent_signatures.at:114" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:114"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getShort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getShort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getShort\">
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:119" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:119"
    $as_echo "zone_permanent_signatures.at:119" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:119"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setShort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setShort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setShort\">
<arg direction=\"in\" name=\"short\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:127" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:127"
    $as_echo "zone_permanent_signatures.at:127" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:127"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getDescription\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getDescription"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getDescription\">
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:127"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:132" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:132"
    $as_echo "zone_permanent_signatures.at:132" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:132"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setDescription\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setDescription"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setDescription\">
<arg direction=\"in\" name=\"description\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:132"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:140" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:140"
    $as_echo "zone_permanent_signatures.at:140" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:140"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getTarget\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getTarget"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getTarget\">
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:145" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:145"
    $as_echo "zone_permanent_signatures.at:145" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:145"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setTarget\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setTarget"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setTarget\">
<arg direction=\"in\" name=\"target\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:145"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:153" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:153"
    $as_echo "zone_permanent_signatures.at:153" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:153"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:153:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getInterfaces\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:153"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getInterfaces"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getInterfaces\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:153"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:158" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:158"
    $as_echo "zone_permanent_signatures.at:158" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:158"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:158:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setInterfaces\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:158"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setInterfaces"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setInterfaces\">
<arg direction=\"in\" name=\"interfaces\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:158"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:163" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:163"
    $as_echo "zone_permanent_signatures.at:163" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:163"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:163:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addInterface\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:163"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addInterface"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addInterface\">
<arg direction=\"in\" name=\"interface\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:163"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:168" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:168"
    $as_echo "zone_permanent_signatures.at:168" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:168"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeInterface\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeInterface"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeInterface\">
<arg direction=\"in\" name=\"interface\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:173" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:173"
    $as_echo "zone_permanent_signatures.at:173" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:173"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"queryInterface\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryInterface"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryInterface\">
<arg direction=\"in\" name=\"interface\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:173"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:182" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:182"
    $as_echo "zone_permanent_signatures.at:182" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:182"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:182:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getSources\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:182"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getSources"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSources\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:182"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:187" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:187"
    $as_echo "zone_permanent_signatures.at:187" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:187"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:187:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setSources\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:187"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setSources"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setSources\">
<arg direction=\"in\" name=\"sources\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:187"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:192" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:192"
    $as_echo "zone_permanent_signatures.at:192" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:192"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:192:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addSource\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:192"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addSource"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addSource\">
<arg direction=\"in\" name=\"source\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:192"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:197" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:197"
    $as_echo "zone_permanent_signatures.at:197" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:197"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:197:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeSource\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:197"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeSource"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeSource\">
<arg direction=\"in\" name=\"source\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:197"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:202" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:202"
    $as_echo "zone_permanent_signatures.at:202" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:202"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:202:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"querySource\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:202"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="querySource"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"querySource\">
<arg direction=\"in\" name=\"source\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:202"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:211" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:211"
    $as_echo "zone_permanent_signatures.at:211" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:211"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getServices\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getServices"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getServices\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:216" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:216"
    $as_echo "zone_permanent_signatures.at:216" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:216"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setServices\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setServices"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setServices\">
<arg direction=\"in\" name=\"services\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:221" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:221"
    $as_echo "zone_permanent_signatures.at:221" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:221"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:221:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addService\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:221"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addService"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addService\">
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:226" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:226"
    $as_echo "zone_permanent_signatures.at:226" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:226"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:226:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeService\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:226"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeService"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeService\">
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:231" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:231"
    $as_echo "zone_permanent_signatures.at:231" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:231"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:231:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"queryService\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:231"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryService"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryService\">
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:240" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:240"
    $as_echo "zone_permanent_signatures.at:240" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:240"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:240:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getPorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:240"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getPorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPorts\">
<arg direction=\"out\" type=\"a(ss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:240"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:245" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:245"
    $as_echo "zone_permanent_signatures.at:245" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:245"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setPorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setPorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setPorts\">
<arg direction=\"in\" name=\"ports\" type=\"a(ss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:250" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:250"
    $as_echo "zone_permanent_signatures.at:250" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:250"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:250:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:250"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addPort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:250"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:256" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:256"
    $as_echo "zone_permanent_signatures.at:256" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:256"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:262" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:262"
    $as_echo "zone_permanent_signatures.at:262" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:262"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:262:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"queryPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:262"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryPort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:262"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:272" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:272"
    $as_echo "zone_permanent_signatures.at:272" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:272"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:272:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getSourcePorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:272"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getSourcePorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSourcePorts\">
<arg direction=\"out\" type=\"a(ss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:272"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:277" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:277"
    $as_echo "zone_permanent_signatures.at:277" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:277"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setSourcePorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setSourcePorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setSourcePorts\">
<arg direction=\"in\" name=\"ports\" type=\"a(ss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:282" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:282"
    $as_echo "zone_permanent_signatures.at:282" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:282"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addSourcePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addSourcePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addSourcePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:288" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:288"
    $as_echo "zone_permanent_signatures.at:288" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:288"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:288:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeSourcePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:288"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeSourcePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeSourcePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:294" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:294"
    $as_echo "zone_permanent_signatures.at:294" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:294"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:294:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"querySourcePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:294"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="querySourcePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"querySourcePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:304" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:304"
    $as_echo "zone_permanent_signatures.at:304" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:304"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:304:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getProtocols\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:304"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getProtocols"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getProtocols\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:304"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:309" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:309"
    $as_echo "zone_permanent_signatures.at:309" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:309"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:309:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setProtocols\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:309"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setProtocols"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setProtocols\">
<arg direction=\"in\" name=\"protocols\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:309"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:314" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:314"
    $as_echo "zone_permanent_signatures.at:314" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:314"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:314:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addProtocol\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:314"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addProtocol"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addProtocol\">
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:314"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:319" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:319"
    $as_echo "zone_permanent_signatures.at:319" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:319"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:319:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeProtocol\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:319"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeProtocol"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeProtocol\">
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:319"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:324" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:324"
    $as_echo "zone_permanent_signatures.at:324" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:324"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:324:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"queryProtocol\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:324"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryProtocol"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryProtocol\">
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:324"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:333" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:333"
    $as_echo "zone_permanent_signatures.at:333" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:333"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:333:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getForwardPorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:333"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getForwardPorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getForwardPorts\">
<arg direction=\"out\" type=\"a(ssss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:333"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:338" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:338"
    $as_echo "zone_permanent_signatures.at:338" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:338"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setForwardPorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setForwardPorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setForwardPorts\">
<arg direction=\"in\" name=\"ports\" type=\"a(ssss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:338"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:343" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:343"
    $as_echo "zone_permanent_signatures.at:343" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:343"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:343:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addForwardPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:343"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addForwardPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addForwardPort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toport\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toaddr\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:343"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:351" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:351"
    $as_echo "zone_permanent_signatures.at:351" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:351"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeForwardPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeForwardPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeForwardPort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toport\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toaddr\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:351"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:359" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:359"
    $as_echo "zone_permanent_signatures.at:359" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:359"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"queryForwardPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryForwardPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryForwardPort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toport\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toaddr\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:371" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:371"
    $as_echo "zone_permanent_signatures.at:371" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:371"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:371:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getMasquerade\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:371"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getMasquerade"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getMasquerade\">
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:371"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:376" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:376"
    $as_echo "zone_permanent_signatures.at:376" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:376"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:376:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setMasquerade\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:376"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setMasquerade"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setMasquerade\">
<arg direction=\"in\" name=\"masquerade\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:381" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:381"
    $as_echo "zone_permanent_signatures.at:381" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:381"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:381:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addMasquerade\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:381"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addMasquerade"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addMasquerade\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:381"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:385" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:385"
    $as_echo "zone_permanent_signatures.at:385" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:385"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:385:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeMasquerade\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:385"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeMasquerade"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeMasquerade\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:385"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:389" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:389"
    $as_echo "zone_permanent_signatures.at:389" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:389"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:389:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"queryMasquerade\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:389"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryMasquerade"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryMasquerade\">
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:389"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:397" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:397"
    $as_echo "zone_permanent_signatures.at:397" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:397"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:397:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getIcmpBlocks\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:397"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getIcmpBlocks"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getIcmpBlocks\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:397"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:402" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:402"
    $as_echo "zone_permanent_signatures.at:402" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:402"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:402:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setIcmpBlocks\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:402"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setIcmpBlocks"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setIcmpBlocks\">
<arg direction=\"in\" name=\"icmptypes\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:402"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:407" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:407"
    $as_echo "zone_permanent_signatures.at:407" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:407"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:407:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addIcmpBlock\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:407"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addIcmpBlock"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addIcmpBlock\">
<arg direction=\"in\" name=\"icmptype\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:407"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:412" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:412"
    $as_echo "zone_permanent_signatures.at:412" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:412"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:412:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeIcmpBlock\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:412"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeIcmpBlock"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeIcmpBlock\">
<arg direction=\"in\" name=\"icmptype\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:412"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:417" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:417"
    $as_echo "zone_permanent_signatures.at:417" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:417"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:417:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"queryIcmpBlock\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:417"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryIcmpBlock"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryIcmpBlock\">
<arg direction=\"in\" name=\"icmptype\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:417"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:426" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:426"
    $as_echo "zone_permanent_signatures.at:426" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:426"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:426:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getIcmpBlockInversion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:426"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getIcmpBlockInversion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getIcmpBlockInversion\">
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:426"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:431" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:431"
    $as_echo "zone_permanent_signatures.at:431" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:431"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:431:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setIcmpBlockInversion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:431"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setIcmpBlockInversion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setIcmpBlockInversion\">
<arg direction=\"in\" name=\"flag\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:436" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:436"
    $as_echo "zone_permanent_signatures.at:436" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:436"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:436:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addIcmpBlockInversion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:436"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addIcmpBlockInversion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addIcmpBlockInversion\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:436"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:440" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:440"
    $as_echo "zone_permanent_signatures.at:440" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:440"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:440:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeIcmpBlockInversion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:440"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeIcmpBlockInversion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeIcmpBlockInversion\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:440"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:444" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:444"
    $as_echo "zone_permanent_signatures.at:444" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:444"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:444:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"queryIcmpBlockInversion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:444"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryIcmpBlockInversion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryIcmpBlockInversion\">
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:444"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:452" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:452"
    $as_echo "zone_permanent_signatures.at:452" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:452"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getRichRules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getRichRules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getRichRules\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:452"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:457" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:457"
    $as_echo "zone_permanent_signatures.at:457" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:457"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:457:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setRichRules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:457"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setRichRules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setRichRules\">
<arg direction=\"in\" name=\"rules\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:457"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:462" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:462"
    $as_echo "zone_permanent_signatures.at:462" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:462"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:462:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addRichRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:462"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addRichRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addRichRule\">
<arg direction=\"in\" name=\"rule\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:462"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:467" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:467"
    $as_echo "zone_permanent_signatures.at:467" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:467"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:467:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeRichRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:467"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeRichRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeRichRule\">
<arg direction=\"in\" name=\"rule\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:467"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:472" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:472"
    $as_echo "zone_permanent_signatures.at:472" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:472"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:472:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"queryRichRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:472"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryRichRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryRichRule\">
<arg direction=\"in\" name=\"rule\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:472"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "zone_permanent_signatures.at:483" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:483"
    $as_echo "zone_permanent_signatures.at:483" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:483"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:483:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"addZone2\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:483"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="addZone2"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addZone2\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"></arg>
<arg direction=\"out\" type=\"o\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:483"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:491" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:491"
    $as_echo "zone_permanent_signatures.at:491" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:491"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:491:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getSettings2\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:491"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getSettings2"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSettings2\">
<arg direction=\"out\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:491"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:497" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:497"
    $as_echo "zone_permanent_signatures.at:497" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:497"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:497:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"update2\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:497"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="update2"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"update2\">
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:497"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "zone_permanent_signatures.at:503" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/zone_permanent_signatures.at:503"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_64
#AT_START_65
at_fn_group_banner 65 'zone_runtime_signatures.at:1' \
  "dbus api - zone runtime signatures" "             " 3
at_xfail=no
(
  $as_echo "65. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_signatures.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone_runtime_signatures.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_runtime_signatures.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_signatures.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "zone_runtime_signatures.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_runtime_signatures.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_runtime_signatures.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "zone_runtime_signatures.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_runtime_signatures.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "zone_runtime_signatures.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/zone_runtime_signatures.at:1"







    $as_echo "zone_runtime_signatures.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:8"
    $as_echo "zone_runtime_signatures.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:8"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1\"]//method[@name=\"getZoneSettings\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1"]//method[@name="getZoneSettings"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getZoneSettings\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"(sssbsasa(ss)asba(ssss)asasasasa(ss)b)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:16" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:16"
    $as_echo "zone_runtime_signatures.at:16" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:16"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1\"]//method[@name=\"getDefaultZone\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1"]//method[@name="getDefaultZone"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getDefaultZone\">
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:21" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:21"
    $as_echo "zone_runtime_signatures.at:21" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:21"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1\"]//method[@name=\"setDefaultZone\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1"]//method[@name="setDefaultZone"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setDefaultZone\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:28" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:28"
    $as_echo "zone_runtime_signatures.at:28" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:28"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getZones\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getZones"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getZones\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:33" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:33"
    $as_echo "zone_runtime_signatures.at:33" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:33"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getActiveZones\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getActiveZones"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getActiveZones\">
<arg direction=\"out\" type=\"a{sa{sas}}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:40" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:40"
    $as_echo "zone_runtime_signatures.at:40" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:40"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getZoneOfInterface\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getZoneOfInterface"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getZoneOfInterface\">
<arg direction=\"in\" name=\"interface\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:46" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:46"
    $as_echo "zone_runtime_signatures.at:46" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:46"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getZoneOfSource\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getZoneOfSource"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getZoneOfSource\">
<arg direction=\"in\" name=\"source\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "zone_runtime_signatures.at:57" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:57"
    $as_echo "zone_runtime_signatures.at:57" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:57"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:57:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"isImmutable\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:57"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="isImmutable"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"isImmutable\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:57"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:65" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:65"
    $as_echo "zone_runtime_signatures.at:65" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:65"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addInterface\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addInterface"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addInterface\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"interface\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:72" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:72"
    $as_echo "zone_runtime_signatures.at:72" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:72"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"InterfaceAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="InterfaceAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"InterfaceAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"interface\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:78" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:78"
    $as_echo "zone_runtime_signatures.at:78" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:78"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"changeZone\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="changeZone"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"changeZone\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"interface\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:85" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:85"
    $as_echo "zone_runtime_signatures.at:85" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:85"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:85:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"ZoneChanged\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:85"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ZoneChanged"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"ZoneChanged\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"interface\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:91" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:91"
    $as_echo "zone_runtime_signatures.at:91" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:91"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"changeZoneOfInterface\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="changeZoneOfInterface"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"changeZoneOfInterface\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"interface\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:98" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:98"
    $as_echo "zone_runtime_signatures.at:98" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:98"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeInterface\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeInterface"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeInterface\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"interface\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:105" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:105"
    $as_echo "zone_runtime_signatures.at:105" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:105"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"InterfaceRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="InterfaceRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"InterfaceRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"interface\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:111" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:111"
    $as_echo "zone_runtime_signatures.at:111" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:111"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"queryInterface\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryInterface"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryInterface\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"interface\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:118" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:118"
    $as_echo "zone_runtime_signatures.at:118" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:118"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getInterfaces\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getInterfaces"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getInterfaces\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:126" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:126"
    $as_echo "zone_runtime_signatures.at:126" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:126"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:126:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addSource\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:126"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addSource"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addSource\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"source\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:126"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:133" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:133"
    $as_echo "zone_runtime_signatures.at:133" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:133"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"SourceAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="SourceAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"SourceAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"source\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:139" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:139"
    $as_echo "zone_runtime_signatures.at:139" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:139"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"changeZoneOfSource\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="changeZoneOfSource"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"changeZoneOfSource\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"source\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:146" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:146"
    $as_echo "zone_runtime_signatures.at:146" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:146"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeSource\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeSource"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeSource\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"source\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:146"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:153" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:153"
    $as_echo "zone_runtime_signatures.at:153" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:153"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:153:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"SourceRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:153"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="SourceRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"SourceRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"source\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:153"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:159" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:159"
    $as_echo "zone_runtime_signatures.at:159" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:159"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:159:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"querySource\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:159"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="querySource"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"querySource\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"source\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:159"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:166" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:166"
    $as_echo "zone_runtime_signatures.at:166" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:166"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getSources\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getSources"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSources\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:174" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:174"
    $as_echo "zone_runtime_signatures.at:174" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:174"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addService\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addService"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addService\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
<arg direction=\"in\" name=\"timeout\" type=\"i\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:182" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:182"
    $as_echo "zone_runtime_signatures.at:182" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:182"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:182:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"ServiceAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:182"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ServiceAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"ServiceAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"service\" type=\"s\"></arg>
<arg name=\"timeout\" type=\"i\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:182"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:189" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:189"
    $as_echo "zone_runtime_signatures.at:189" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:189"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:189:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeService\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:189"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeService"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeService\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:189"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:196" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:196"
    $as_echo "zone_runtime_signatures.at:196" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:196"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:196:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"ServiceRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:196"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ServiceRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"ServiceRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"service\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:196"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:202" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:202"
    $as_echo "zone_runtime_signatures.at:202" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:202"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:202:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"queryService\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:202"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryService"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryService\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:202"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:209" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:209"
    $as_echo "zone_runtime_signatures.at:209" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:209"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:209:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getServices\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:209"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getServices"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getServices\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:209"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:217" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:217"
    $as_echo "zone_runtime_signatures.at:217" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:217"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addProtocol\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addProtocol"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addProtocol\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"in\" name=\"timeout\" type=\"i\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:225" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:225"
    $as_echo "zone_runtime_signatures.at:225" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:225"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:225:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"ProtocolAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:225"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ProtocolAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"ProtocolAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"protocol\" type=\"s\"></arg>
<arg name=\"timeout\" type=\"i\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:232" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:232"
    $as_echo "zone_runtime_signatures.at:232" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:232"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeProtocol\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeProtocol"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeProtocol\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:232"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:239" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:239"
    $as_echo "zone_runtime_signatures.at:239" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:239"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"ProtocolRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ProtocolRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"ProtocolRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"protocol\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:245" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:245"
    $as_echo "zone_runtime_signatures.at:245" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:245"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"queryProtocol\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryProtocol"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryProtocol\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:252" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:252"
    $as_echo "zone_runtime_signatures.at:252" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:252"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getProtocols\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getProtocols"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getProtocols\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:260" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:260"
    $as_echo "zone_runtime_signatures.at:260" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:260"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:260:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:260"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addPort\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"in\" name=\"timeout\" type=\"i\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:260"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:269" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:269"
    $as_echo "zone_runtime_signatures.at:269" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:269"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"PortAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="PortAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"PortAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"port\" type=\"s\"></arg>
<arg name=\"protocol\" type=\"s\"></arg>
<arg name=\"timeout\" type=\"i\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:277" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:277"
    $as_echo "zone_runtime_signatures.at:277" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:277"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removePort\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:285" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:285"
    $as_echo "zone_runtime_signatures.at:285" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:285"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"PortRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="PortRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"PortRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"port\" type=\"s\"></arg>
<arg name=\"protocol\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:285"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:292" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:292"
    $as_echo "zone_runtime_signatures.at:292" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:292"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"queryPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryPort\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:300" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:300"
    $as_echo "zone_runtime_signatures.at:300" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:300"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getPorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getPorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPorts\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"aas\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:310" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:310"
    $as_echo "zone_runtime_signatures.at:310" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:310"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:310:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addSourcePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:310"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addSourcePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addSourcePort\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"in\" name=\"timeout\" type=\"i\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:310"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:319" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:319"
    $as_echo "zone_runtime_signatures.at:319" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:319"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:319:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"SourcePortAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:319"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="SourcePortAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"SourcePortAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"port\" type=\"s\"></arg>
<arg name=\"protocol\" type=\"s\"></arg>
<arg name=\"timeout\" type=\"i\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:319"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:327" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:327"
    $as_echo "zone_runtime_signatures.at:327" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:327"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:327:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeSourcePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:327"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeSourcePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeSourcePort\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:327"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:335" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:335"
    $as_echo "zone_runtime_signatures.at:335" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:335"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"SourcePortRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="SourcePortRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"SourcePortRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"port\" type=\"s\"></arg>
<arg name=\"protocol\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:335"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:342" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:342"
    $as_echo "zone_runtime_signatures.at:342" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:342"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:342:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"querySourcePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:342"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="querySourcePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"querySourcePort\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:342"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:350" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:350"
    $as_echo "zone_runtime_signatures.at:350" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:350"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getSourcePorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getSourcePorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSourcePorts\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"aas\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:350"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:360" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:360"
    $as_echo "zone_runtime_signatures.at:360" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:360"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:360:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addForwardPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:360"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addForwardPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addForwardPort\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toport\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toaddr\" type=\"s\"></arg>
<arg direction=\"in\" name=\"timeout\" type=\"i\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:360"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:371" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:371"
    $as_echo "zone_runtime_signatures.at:371" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:371"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:371:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"ForwardPortAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:371"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ForwardPortAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"ForwardPortAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"port\" type=\"s\"></arg>
<arg name=\"protocol\" type=\"s\"></arg>
<arg name=\"toport\" type=\"s\"></arg>
<arg name=\"toaddr\" type=\"s\"></arg>
<arg name=\"timeout\" type=\"i\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:371"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:381" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:381"
    $as_echo "zone_runtime_signatures.at:381" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:381"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:381:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeForwardPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:381"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeForwardPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeForwardPort\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toport\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toaddr\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:381"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:391" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:391"
    $as_echo "zone_runtime_signatures.at:391" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:391"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:391:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"ForwardPortRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:391"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ForwardPortRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"ForwardPortRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"port\" type=\"s\"></arg>
<arg name=\"protocol\" type=\"s\"></arg>
<arg name=\"toport\" type=\"s\"></arg>
<arg name=\"toaddr\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:391"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:400" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:400"
    $as_echo "zone_runtime_signatures.at:400" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:400"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:400:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"queryForwardPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:400"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryForwardPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryForwardPort\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toport\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toaddr\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:400"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:410" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:410"
    $as_echo "zone_runtime_signatures.at:410" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:410"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:410:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getForwardPorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:410"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getForwardPorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getForwardPorts\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"aas\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:410"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:420" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:420"
    $as_echo "zone_runtime_signatures.at:420" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:420"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:420:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addMasquerade\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:420"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addMasquerade"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addMasquerade\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"timeout\" type=\"i\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:420"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:427" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:427"
    $as_echo "zone_runtime_signatures.at:427" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:427"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:427:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"MasqueradeAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:427"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="MasqueradeAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"MasqueradeAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"timeout\" type=\"i\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:427"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:433" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:433"
    $as_echo "zone_runtime_signatures.at:433" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:433"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:433:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeMasquerade\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:433"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeMasquerade"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeMasquerade\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:433"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:439" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:439"
    $as_echo "zone_runtime_signatures.at:439" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:439"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:439:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"MasqueradeRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:439"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="MasqueradeRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"MasqueradeRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:439"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:444" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:444"
    $as_echo "zone_runtime_signatures.at:444" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:444"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:444:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"queryMasquerade\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:444"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryMasquerade"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryMasquerade\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:444"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:452" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:452"
    $as_echo "zone_runtime_signatures.at:452" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:452"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addIcmpBlock\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addIcmpBlock"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addIcmpBlock\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"icmp\" type=\"s\"></arg>
<arg direction=\"in\" name=\"timeout\" type=\"i\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:452"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:460" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:460"
    $as_echo "zone_runtime_signatures.at:460" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:460"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:460:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"IcmpBlockAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:460"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="IcmpBlockAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"IcmpBlockAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"icmp\" type=\"s\"></arg>
<arg name=\"timeout\" type=\"i\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:460"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:467" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:467"
    $as_echo "zone_runtime_signatures.at:467" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:467"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:467:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeIcmpBlock\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:467"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeIcmpBlock"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeIcmpBlock\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"icmp\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:467"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:474" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:474"
    $as_echo "zone_runtime_signatures.at:474" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:474"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:474:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"IcmpBlockRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:474"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="IcmpBlockRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"IcmpBlockRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"icmp\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:480" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:480"
    $as_echo "zone_runtime_signatures.at:480" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:480"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:480:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"queryIcmpBlock\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:480"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryIcmpBlock"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryIcmpBlock\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"icmp\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:480"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:487" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:487"
    $as_echo "zone_runtime_signatures.at:487" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:487"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:487:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getIcmpBlocks\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:487"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getIcmpBlocks"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getIcmpBlocks\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:487"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:495" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:495"
    $as_echo "zone_runtime_signatures.at:495" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:495"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:495:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addIcmpBlockInversion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:495"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addIcmpBlockInversion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addIcmpBlockInversion\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:495"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:501" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:501"
    $as_echo "zone_runtime_signatures.at:501" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:501"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:501:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"IcmpBlockInversionAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:501"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="IcmpBlockInversionAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"IcmpBlockInversionAdded\">
<arg name=\"zone\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:506" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:506"
    $as_echo "zone_runtime_signatures.at:506" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:506"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:506:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeIcmpBlockInversion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:506"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeIcmpBlockInversion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeIcmpBlockInversion\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:506"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:512" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:512"
    $as_echo "zone_runtime_signatures.at:512" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:512"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:512:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"IcmpBlockInversionRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:512"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="IcmpBlockInversionRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"IcmpBlockInversionRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:512"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:517" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:517"
    $as_echo "zone_runtime_signatures.at:517" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:517"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"queryIcmpBlockInversion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryIcmpBlockInversion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryIcmpBlockInversion\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:517"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:525" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:525"
    $as_echo "zone_runtime_signatures.at:525" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:525"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:525:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addRichRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:525"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addRichRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addRichRule\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"rule\" type=\"s\"></arg>
<arg direction=\"in\" name=\"timeout\" type=\"i\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:525"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:533" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:533"
    $as_echo "zone_runtime_signatures.at:533" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:533"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:533:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"RichRuleAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:533"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="RichRuleAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"RichRuleAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"rule\" type=\"s\"></arg>
<arg name=\"timeout\" type=\"i\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:540" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:540"
    $as_echo "zone_runtime_signatures.at:540" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:540"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:540:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeRichRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:540"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeRichRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeRichRule\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"rule\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:540"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:547" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:547"
    $as_echo "zone_runtime_signatures.at:547" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:547"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"RichRuleRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="RichRuleRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"RichRuleRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"rule\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:547"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:553" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:553"
    $as_echo "zone_runtime_signatures.at:553" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:553"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:553:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"queryRichRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:553"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryRichRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryRichRule\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"rule\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:553"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:560" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:560"
    $as_echo "zone_runtime_signatures.at:560" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:560"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:560:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getRichRules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:560"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getRichRules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getRichRules\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:560"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "zone_runtime_signatures.at:571" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:571"
    $as_echo "zone_runtime_signatures.at:571" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:571"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:571:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getZoneSettings2\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:571"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getZoneSettings2"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getZoneSettings2\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:571"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:578" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:578"
    $as_echo "zone_runtime_signatures.at:578" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:578"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:578:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"setZoneSettings2\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:578"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="setZoneSettings2"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setZoneSettings2\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:578"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "zone_runtime_signatures.at:585" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/zone_runtime_signatures.at:585"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_65
#AT_START_66
at_fn_group_banner 66 'zone_permanent_functional.at:1' \
  "dbus api - zone permanent functional" "           " 3
at_xfail=no
(
  $as_echo "66. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone_permanent_functional.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_permanent_functional.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "zone_permanent_functional.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_permanent_functional.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_permanent_functional.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "zone_permanent_functional.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_permanent_functional.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "zone_permanent_functional.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/zone_permanent_functional.at:1"







    $as_echo "zone_permanent_functional.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:8"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addZone \"foobar\"      '(\"1.0\",        \"foobar\",        \"foobar zone\",        false,        \"ACCEPT\",        [\"ssh\", \"mdns\"],        [(\"1234\", \"tcp\"), (\"1234\", \"udp\")],        [\"echo-request\"],        true,        [(\"1234\", \"tcp\", \"4321\", \"\"), (\"1234\", \"udp\", \"4321\", \"10.10.10.10\")],        [\"dummy0\", \"dummy1\"],        [\"10.10.10.0/24\"],        [\"rule family=ipv4 source address=10.20.20.20 drop\"],        [\"icmp\"],        [(\"1234\", \"tcp\"), (\"1234\", \"udp\")],        false       )'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addZone "foobar"      '("1.0",        "foobar",        "foobar zone",        false,        "ACCEPT",        ["ssh", "mdns"],        [("1234", "tcp"), ("1234", "udp")],        ["echo-request"],        true,        [("1234", "tcp", "4321", ""), ("1234", "udp", "4321", "10.10.10.10")],        ["dummy0", "dummy1"],        ["10.10.10.0/24"],        ["rule family=ipv4 source address=10.20.20.20 drop"],        ["icmp"],        [("1234", "tcp"), ("1234", "udp")],        false       )'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }



DBUS_FOOBAR_ZONE_OBJ=$(sed -e "s/.*config\/zone\/\([^']\+\)['].*/\1/" ./stdout)
export DBUS_FOOBAR_ZONE_OBJ

if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zones |grep "nm-shared" >/dev/null ; then
    NM_SHARED="'nm-shared', "
    export NM_SHARED
fi

    $as_echo "zone_permanent_functional.at:37" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:37"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneNames ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneNames ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['block', 'dmz', 'drop', 'external', 'foobar', 'home', 'internal', ${NM_SHARED}'public', 'trusted', 'work'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:40" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:40"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.listZones ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.listZones ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sed -e \"s/['][,]/'\\n/g\" ./stdout |          sed -e \"s/.*config\\/zone\\/\\([^']\\+\\)['].*/\\1/\" |          while read LINE; do { echo \"\${LINE}\" | grep \"^[0-9]\\+\$\" ; } || exit 1; done "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sed -e "s/['][,]/'\n/g" ./stdout |          sed -e "s/.*config\/zone\/\([^']\+\)['].*/\1/" |          while read LINE; do { echo "${LINE}" | grep "^[0-9]\+$" ; } || exit 1; done
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }



    $as_echo "zone_permanent_functional.at:44" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:44"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sed -e \"s/.*config\\/zone\\/\\([^']\\+\\)['].*/\\1/\" ./stdout | grep \"^[0-9]\\+\$\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sed -e "s/.*config\/zone\/\([^']\+\)['].*/\1/" ./stdout | grep "^[0-9]\+$"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone public --add-interface dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone public --add-interface dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:49" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:49"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneOfInterface \"dummy2\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneOfInterface "dummy2"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone public --remove-interface dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone public --remove-interface dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone public --add-source 10.20.20.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone public --add-source 10.20.20.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:56" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:56"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneOfSource \"10.20.20.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneOfSource "10.20.20.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone public --remove-source 10.20.20.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone public --remove-source 10.20.20.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }







    $as_echo "zone_permanent_functional.at:65" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:65"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.0', 'foobar', 'foobar zone', false, 'ACCEPT', ['ssh', 'mdns'], [('1234', 'tcp'), ('1234', 'udp')], ['echo-request'], true, [('1234', 'tcp', '4321', ''), ('1234', 'udp', '4321', '10.10.10.10')], ['dummy0', 'dummy1'], ['10.10.10.0/24'], ['rule family=\"ipv4\" source address=\"10.20.20.20\" drop'], ['icmp'], [('1234', 'tcp'), ('1234', 'udp')], false),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:86" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:86"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update      '(\"1.1\",        \"foobar v2\",        \"foobar zone updated\",        false,        \"ACCEPT\",        [\"ssh\", \"mdns\", \"samba\"],        [(\"1234\", \"tcp\"), (\"4444\", \"udp\")],        [\"echo-request\", \"echo-reply\"],        false,        [(\"1234\", \"tcp\", \"4321\", \"\")],        [\"dummy0\", \"dummy1\", \"dummy2\"],        [\"10.10.10.0/24\", \"10.20.0.0/16\"],        [\"rule family=ipv4 source address=10.20.20.20 reject\"],        [\"icmp\", \"ipv6-icmp\"],        [(\"1234\", \"tcp\"), (\"6666\", \"udp\")],        true       )'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update      '("1.1",        "foobar v2",        "foobar zone updated",        false,        "ACCEPT",        ["ssh", "mdns", "samba"],        [("1234", "tcp"), ("4444", "udp")],        ["echo-request", "echo-reply"],        false,        [("1234", "tcp", "4321", "")],        ["dummy0", "dummy1", "dummy2"],        ["10.10.10.0/24", "10.20.0.0/16"],        ["rule family=ipv4 source address=10.20.20.20 reject"],        ["icmp", "ipv6-icmp"],        [("1234", "tcp"), ("6666", "udp")],        true       )'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:105" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:105"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.1', 'foobar v2', 'foobar zone updated', false, 'ACCEPT', ['ssh', 'mdns', 'samba'], [('1234', 'tcp'), ('4444', 'udp')], ['echo-request', 'echo-reply'], false, [('1234', 'tcp', '4321', '')], ['dummy0', 'dummy1', 'dummy2'], ['10.10.10.0/24', '10.20.0.0/16'], ['rule family=\"ipv4\" source address=\"10.20.20.20\" reject'], ['icmp', 'ipv6-icmp'], [('1234', 'tcp'), ('6666', 'udp')], true),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:125" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:125"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.rename \"foobar-renamed\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.rename "foobar-renamed"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:126" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:126"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:126:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName \"foobar-renamed\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:126"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName "foobar-renamed"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:126"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:129" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:129"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:129:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.remove ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:129"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.remove ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:129"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:130" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:130"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName \"foobar-renamed\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName "foobar-renamed"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/zone_permanent_functional.at:130"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:133" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:133"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }



DBUS_PUBLIC_ZONE_OBJ=$(sed -e "s/.*config\/zone\/\([^']\+\)['].*/\1/" ./stdout)
export DBUS_PUBLIC_ZONE_OBJ


    $as_echo "zone_permanent_functional.at:138" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:138"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.loadDefaults ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.loadDefaults ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:141" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:141"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getVersion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getVersion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:144" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:144"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:144:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setVersion \"1.1\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:144"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setVersion "1.1"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:144"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:145" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:145"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getVersion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getVersion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('1.1',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:145"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:150" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:150"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getShort ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getShort ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('Public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:150"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:153" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:153"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:153:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setShort \"Public updated\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:153"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setShort "Public updated"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:153"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:154" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:154"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:154:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getShort ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:154"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getShort ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('Public updated',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:154"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:159" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:159"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:159:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getDescription ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:159"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getDescription ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:159"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:162" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:162"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:162:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setDescription \"A shorter description.\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:162"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setDescription "A shorter description."; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:162"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:163" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:163"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:163:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getDescription ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:163"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getDescription ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('A shorter description.',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:163"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:168" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:168"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getTarget ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getTarget ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('default',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:171" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:171"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:171:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setTarget \"ACCEPT\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:171"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setTarget "ACCEPT"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:171"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:172" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:172"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:172:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getTarget ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:172"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getTarget ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('ACCEPT',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:172"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:177" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:177"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:177:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addInterface \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:177"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addInterface "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:177"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:178" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:178"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:178:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryInterface \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:178"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryInterface "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:178"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:181" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:181"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:181:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryInterface \"dummy1\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:181"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryInterface "dummy1"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:181"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:184" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:184"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:184:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setInterfaces '[\"dummy0\", \"dummy1\"]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:184"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setInterfaces '["dummy0", "dummy1"]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:184"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:185" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:185"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:185:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getInterfaces ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:185"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getInterfaces ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['dummy0', 'dummy1'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:185"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:188" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:188"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:188:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeInterface \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:188"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeInterface "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:188"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:189" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:189"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:189:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getInterfaces ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:189"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getInterfaces ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['dummy1'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:189"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:194" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:194"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:194:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addSource \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:194"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addSource "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:194"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:195" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:195"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:195:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.querySource \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:195"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.querySource "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:195"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:198" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:198"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:198:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.querySource \"10.20.20.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:198"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.querySource "10.20.20.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:198"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:201" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:201"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:201:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setSources '[\"10.10.10.0/24\", \"10.20.20.0/24\"]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:201"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setSources '["10.10.10.0/24", "10.20.20.0/24"]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:201"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:202" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:202"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:202:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSources ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:202"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSources ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['10.10.10.0/24', '10.20.20.0/24'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:202"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:205" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:205"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:205:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeSource \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:205"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeSource "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:205"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:206" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:206"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:206:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSources ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:206"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSources ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['10.20.20.0/24'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:206"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:211" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:211"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addService \"samba\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addService "samba"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:212" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:212"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryService \"samba\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryService "samba"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:215" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:215"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryService \"https\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryService "https"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:218" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:218"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:218:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setServices '[\"samba\", \"https\"]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:218"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setServices '["samba", "https"]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:218"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:219" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:219"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:219:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getServices ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:219"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getServices ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['samba', 'https'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:219"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:222" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:222"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:222:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeService \"samba\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:222"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeService "samba"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:222"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:223" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:223"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getServices ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getServices ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['https'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:228" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:228"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:228:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addPort \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:228"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addPort "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:228"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:229" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:229"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryPort \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryPort "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:232" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:232"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryPort \"4321\" \"udp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryPort "4321" "udp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:232"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:235" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:235"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setPorts '[(\"1234\", \"tcp\"), (\"4321\", \"udp\")]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setPorts '[("1234", "tcp"), ("4321", "udp")]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:235"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:236" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:236"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getPorts ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getPorts ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "([('1234', 'tcp'), ('4321', 'udp')],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:239" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:239"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removePort \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removePort "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:240" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:240"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:240:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getPorts ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:240"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getPorts ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "([('4321', 'udp')],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:240"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:245" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:245"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addSourcePort \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addSourcePort "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:246" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:246"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.querySourcePort \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.querySourcePort "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:249" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:249"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.querySourcePort \"4321\" \"udp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.querySourcePort "4321" "udp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:249"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:252" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:252"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setSourcePorts '[(\"1234\", \"tcp\"), (\"4321\", \"udp\")]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setSourcePorts '[("1234", "tcp"), ("4321", "udp")]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:253" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:253"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSourcePorts ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSourcePorts ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "([('1234', 'tcp'), ('4321', 'udp')],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:256" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:256"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeSourcePort \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeSourcePort "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:257" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:257"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:257:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSourcePorts ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:257"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSourcePorts ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "([('4321', 'udp')],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:257"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:262" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:262"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:262:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addForwardPort \"1234\" \"tcp\" \"1111\" \"\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:262"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addForwardPort "1234" "tcp" "1111" ""; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:262"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:263" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:263"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:263:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryForwardPort \"1234\" \"tcp\" \"1111\" \"\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:263"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryForwardPort "1234" "tcp" "1111" ""; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:263"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:266" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:266"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:266:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryForwardPort \"4321\" \"udp\" \"4444\" \"10.10.10.10\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:266"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryForwardPort "4321" "udp" "4444" "10.10.10.10"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:266"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:269" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:269"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setForwardPorts '[(\"1234\", \"tcp\", \"1111\", \"\"), (\"4321\", \"udp\", \"4444\", \"10.10.10.10\")]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setForwardPorts '[("1234", "tcp", "1111", ""), ("4321", "udp", "4444", "10.10.10.10")]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:270" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:270"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getForwardPorts ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getForwardPorts ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "([('1234', 'tcp', '1111', ''), ('4321', 'udp', '4444', '10.10.10.10')],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:273" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:273"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeForwardPort \"1234\" \"tcp\" \"1111\" \"\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeForwardPort "1234" "tcp" "1111" ""; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:274" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:274"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getForwardPorts ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getForwardPorts ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "([('4321', 'udp', '4444', '10.10.10.10')],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:274"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:279" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:279"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addProtocol \"icmp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addProtocol "icmp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:280" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:280"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryProtocol \"icmp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryProtocol "icmp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:283" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:283"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryProtocol \"igmp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryProtocol "igmp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:283"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:286" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:286"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setProtocols '[\"icmp\", \"igmp\"]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setProtocols '["icmp", "igmp"]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:287" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:287"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:287:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getProtocols ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:287"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getProtocols ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['icmp', 'igmp'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:287"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:290" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:290"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeProtocol \"icmp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeProtocol "icmp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:291" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:291"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getProtocols ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getProtocols ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['igmp'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:291"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:296" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:296"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryMasquerade ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryMasquerade ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:296"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:299" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:299"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addMasquerade ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addMasquerade ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:300" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:300"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryMasquerade ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryMasquerade ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:303" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:303"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:303:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setMasquerade true; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:303"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setMasquerade true; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:303"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:304" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:304"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:304:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getMasquerade ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:304"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getMasquerade ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:304"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:307" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:307"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeMasquerade ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeMasquerade ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:308" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:308"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:308:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getMasquerade ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:308"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getMasquerade ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:308"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:313" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:313"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:313:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addIcmpBlock \"echo-reply\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:313"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addIcmpBlock "echo-reply"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:313"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:314" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:314"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:314:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryIcmpBlock \"echo-reply\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:314"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryIcmpBlock "echo-reply"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:314"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:317" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:317"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:317:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryIcmpBlock \"echo-request\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:317"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryIcmpBlock "echo-request"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:317"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:320" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:320"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:320:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setIcmpBlocks '[\"echo-reply\", \"echo-request\"]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:320"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setIcmpBlocks '["echo-reply", "echo-request"]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:320"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:321" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:321"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:321:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getIcmpBlocks ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:321"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getIcmpBlocks ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['echo-reply', 'echo-request'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:321"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:324" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:324"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:324:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeIcmpBlock \"echo-reply\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:324"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeIcmpBlock "echo-reply"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:324"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:325" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:325"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:325:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getIcmpBlocks ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:325"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getIcmpBlocks ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['echo-request'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:325"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:330" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:330"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:330:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryIcmpBlockInversion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:330"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryIcmpBlockInversion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:330"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:333" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:333"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:333:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addIcmpBlockInversion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:333"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addIcmpBlockInversion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:333"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:334" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:334"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:334:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryIcmpBlockInversion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:334"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryIcmpBlockInversion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:334"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:337" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:337"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setIcmpBlockInversion true; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setIcmpBlockInversion true; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:338" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:338"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getIcmpBlockInversion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getIcmpBlockInversion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:338"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:341" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:341"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:341:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeIcmpBlockInversion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:341"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeIcmpBlockInversion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:341"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:342" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:342"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:342:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getIcmpBlockInversion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:342"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getIcmpBlockInversion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:342"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:347" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:347"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addRichRule \"rule family=ipv4 source address=10.10.10.0/24 accept\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addRichRule "rule family=ipv4 source address=10.10.10.0/24 accept"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:347"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:348" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:348"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryRichRule \"rule family=ipv4 source address=10.10.10.0/24 accept\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryRichRule "rule family=ipv4 source address=10.10.10.0/24 accept"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:348"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:351" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:351"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryRichRule \"rule family=ipv4 source address=10.20.20.0/24 drop\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryRichRule "rule family=ipv4 source address=10.20.20.0/24 drop"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:351"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:354" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:354"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setRichRules '[\"rule family=ipv4 source address=10.10.10.0/24 accept\", \"rule family=ipv4 source address=10.20.20.0/24 drop\"]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setRichRules '["rule family=ipv4 source address=10.10.10.0/24 accept", "rule family=ipv4 source address=10.20.20.0/24 drop"]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:354"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:355" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:355"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getRichRules ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getRichRules ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['rule family=\"ipv4\" source address=\"10.10.10.0/24\" accept', 'rule family=\"ipv4\" source address=\"10.20.20.0/24\" drop'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:355"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:358" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:358"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:358:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeRichRule \"rule family=ipv4 source address=10.10.10.0/24 accept\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:358"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeRichRule "rule family=ipv4 source address=10.10.10.0/24 accept"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:358"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:359" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:359"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getRichRules ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getRichRules ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['rule family=\"ipv4\" source address=\"10.20.20.0/24\" drop'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "zone_permanent_functional.at:367" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:367"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addZone2 \"foobar2\"      '{\"version\": <\"1.0\">,        \"short\": <\"foobar\">,        \"description\": <\"foobar zone\">,        \"target\": <\"ACCEPT\">,        \"services\": <[\"ssh\", \"mdns\"]>,        \"ports\": <[(\"1234\", \"tcp\"), (\"1234\", \"udp\")]>,        \"icmp_blocks\": <[\"echo-request\"]>,        \"masquerade\": <true>,        \"forward\": <false>,        \"forward_ports\": <[(\"1234\", \"tcp\", \"4321\", \"\"), (\"1234\", \"udp\", \"4321\", \"10.10.10.10\")]>,        \"interfaces\": <[\"dummy2\", \"dummy3\"]>,        \"sources\": <[\"10.10.10.0/24\"]>,        \"rules_str\": <[\"rule family=ipv4 source address=10.20.20.20 drop\"]>,        \"protocols\": <[\"icmp\"]>,        \"source_ports\": <[(\"1234\", \"tcp\"), (\"1234\", \"udp\")]>,        \"icmp_block_inversion\": <false>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addZone2 "foobar2"      '{"version": <"1.0">,        "short": <"foobar">,        "description": <"foobar zone">,        "target": <"ACCEPT">,        "services": <["ssh", "mdns"]>,        "ports": <[("1234", "tcp"), ("1234", "udp")]>,        "icmp_blocks": <["echo-request"]>,        "masquerade": <true>,        "forward": <false>,        "forward_ports": <[("1234", "tcp", "4321", ""), ("1234", "udp", "4321", "10.10.10.10")]>,        "interfaces": <["dummy2", "dummy3"]>,        "sources": <["10.10.10.0/24"]>,        "rules_str": <["rule family=ipv4 source address=10.20.20.20 drop"]>,        "protocols": <["icmp"]>,        "source_ports": <[("1234", "tcp"), ("1234", "udp")]>,        "icmp_block_inversion": <false>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:367"
$at_failed && at_fn_log_failure
$at_traceon; }



DBUS_FOOBAR2_ZONE_OBJ=$(sed -e "s/.*config\/zone\/\([^']\+\)['].*/\1/" ./stdout)
export DBUS_FOOBAR2_ZONE_OBJ


    $as_echo "zone_permanent_functional.at:390" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:390"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:390:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:390"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar zone'>
'egress_priority': <0>
'forward': <false>
'forward_ports': <[('1234', 'tcp', '4321', ''), ('1234', 'udp', '4321', '10.10.10.10')]>
'icmp_block_inversion': <false>
'icmp_blocks': <['echo-request']>
'ingress_priority': <0>
'interfaces': <['dummy2', 'dummy3']>
'masquerade': <true>
'ports': <[('1234', 'tcp'), ('1234', 'udp')]>
'protocols': <['icmp']>
'rules_str': <['rule family=\"ipv4\" source address=\"10.20.20.20\" drop']>
'services': <['ssh', 'mdns']>
'short': <'foobar'>
'source_ports': <[('1234', 'tcp'), ('1234', 'udp')]>
'sources': <['10.10.10.0/24']>
'target': <'ACCEPT'>
'version': <'1.0'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:390"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:413" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:413"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:413:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update2      '{\"version\": <\"1.1\">,        \"short\": <\"foobar update2\">,        \"description\": <\"foobar zone update2\">,        \"target\": <\"DROP\">,        \"services\": <[\"mdns\"]>,        \"ports\": <[(\"1234\", \"udp\")]>,        \"icmp_blocks\": <[\"echo-request\", \"echo-reply\"]>,        \"masquerade\": <false>,        \"forward_ports\": <[(\"1234\", \"udp\", \"4321\", \"10.10.10.10\")]>,        \"interfaces\": <[\"dummy3\"]>,        \"sources\": <[\"10.10.10.0/24\", \"10.30.30.0/24\"]>,        \"rules_str\": <[\"rule family=ipv4 source address=10.20.20.20 accept\"]>,        \"protocols\": <[\"ipv6-icmp\"]>,        \"source_ports\": <[(\"1234\", \"udp\")]>,        \"ingress_priority\": <1>,        \"egress_priority\": <-300>,        \"icmp_block_inversion\": <true>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:413"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update2      '{"version": <"1.1">,        "short": <"foobar update2">,        "description": <"foobar zone update2">,        "target": <"DROP">,        "services": <["mdns"]>,        "ports": <[("1234", "udp")]>,        "icmp_blocks": <["echo-request", "echo-reply"]>,        "masquerade": <false>,        "forward_ports": <[("1234", "udp", "4321", "10.10.10.10")]>,        "interfaces": <["dummy3"]>,        "sources": <["10.10.10.0/24", "10.30.30.0/24"]>,        "rules_str": <["rule family=ipv4 source address=10.20.20.20 accept"]>,        "protocols": <["ipv6-icmp"]>,        "source_ports": <[("1234", "udp")]>,        "ingress_priority": <1>,        "egress_priority": <-300>,        "icmp_block_inversion": <true>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:413"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:433" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:433"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:433:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:433"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar zone update2'>
'egress_priority': <-300>
'forward': <false>
'forward_ports': <[('1234', 'udp', '4321', '10.10.10.10')]>
'icmp_block_inversion': <true>
'icmp_blocks': <['echo-request', 'echo-reply']>
'ingress_priority': <1>
'interfaces': <['dummy3']>
'masquerade': <false>
'ports': <[('1234', 'udp')]>
'protocols': <['ipv6-icmp']>
'rules_str': <['rule family=\"ipv4\" source address=\"10.20.20.20\" accept']>
'services': <['mdns']>
'short': <'foobar update2'>
'source_ports': <[('1234', 'udp')]>
'sources': <['10.10.10.0/24', '10.30.30.0/24']>
'target': <'DROP'>
'version': <'1.1'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:433"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:455" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:455"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update2      '{\"version\": <\"1.2\">,        \"target\": <\"ACCEPT\">       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update2      '{"version": <"1.2">,        "target": <"ACCEPT">       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:455"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:461" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:461"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:461:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update2      '{\"version\": <\"1.3\">,        \"icmp_blocks\": <@as []>,        \"icmp_block_inversion\": <false>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:461"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update2      '{"version": <"1.3">,        "icmp_blocks": <@as []>,        "icmp_block_inversion": <false>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:461"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:468" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:468"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:468:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update2      '{\"version\": <\"1.4\">,        \"forward_ports\": <@a(ssss) []>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:468"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update2      '{"version": <"1.4">,        "forward_ports": <@a(ssss) []>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:468"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:474" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:474"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:474:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:474"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar zone update2'>
'egress_priority': <-300>
'forward': <false>
'icmp_block_inversion': <false>
'ingress_priority': <1>
'interfaces': <['dummy3']>
'masquerade': <false>
'ports': <[('1234', 'udp')]>
'protocols': <['ipv6-icmp']>
'rules_str': <['rule family=\"ipv4\" source address=\"10.20.20.20\" accept']>
'services': <['mdns']>
'short': <'foobar update2'>
'source_ports': <[('1234', 'udp')]>
'sources': <['10.10.10.0/24', '10.30.30.0/24']>
'target': <'ACCEPT'>
'version': <'1.4'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_ZONE: foobar-renamed/d'" != x"ignore"; then
            $as_echo "zone_permanent_functional.at:493" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ZONE: foobar-renamed/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/zone_permanent_functional.at:493"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_66
#AT_START_67
at_fn_group_banner 67 'zone_runtime_functional.at:1' \
  "dbus api - zone runtime functional" "             " 3
at_xfail=no
(
  $as_echo "67. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone_runtime_functional.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_runtime_functional.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "zone_runtime_functional.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_runtime_functional.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_runtime_functional.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "zone_runtime_functional.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_runtime_functional.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "zone_runtime_functional.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/zone_runtime_functional.at:1"







    $as_echo "zone_runtime_functional.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:8"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getZoneSettings \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getZoneSettings "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('', 'Public', 'For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.', false, 'default', ['ssh', 'dhcpv6-client'], @a(ss) [], @as [], false, @a(ssss) [], @as [], @as [], @as [], @as [], @a(ss) [], false),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:28" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:28"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getDefaultZone ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getDefaultZone ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:31" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:31"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.setDefaultZone 'drop'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.setDefaultZone 'drop'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "()
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:34" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:34"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getDefaultZone ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getDefaultZone ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('drop',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }




if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zones |grep "nm-shared" >/dev/null ; then
    NM_SHARED="'nm-shared', "
    export NM_SHARED
fi

    $as_echo "zone_runtime_functional.at:43" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:43"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZones ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZones ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['block', 'dmz', 'drop', 'external', 'home', 'internal', ${NM_SHARED}'public', 'trusted', 'work'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone public --add-interface dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone public --add-interface dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone public --add-source 10.1.1.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone public --add-source 10.1.1.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:48" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:48"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getActiveZones ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getActiveZones ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'public': {'interfaces': ['dummy0'], 'sources': ['10.1.1.1']}, 'drop': {'interfaces': [], 'sources': []}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone public --remove-interface dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone public --remove-interface dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone public --remove-source 10.1.1.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone public --remove-source 10.1.1.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone public --add-interface dummy1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone public --add-interface dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:56" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:56"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneOfInterface \"dummy1\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneOfInterface "dummy1"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone public --remove-interface dummy1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone public --remove-interface dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone drop --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone drop --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:61" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:61"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneOfSource \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneOfSource "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('drop',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone drop --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone drop --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    $as_echo "zone_runtime_functional.at:71" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:71"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.isImmutable \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.isImmutable "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:76" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:76"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addInterface \"public\" \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addInterface "public" "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:79" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:79"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:79:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.changeZone \"drop\" \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:79"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.changeZone "drop" "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('drop',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:82" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:82"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryInterface \"public\" \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryInterface "public" "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:85" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:85"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:85:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryInterface \"drop\" \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:85"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryInterface "drop" "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:88" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:88"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.changeZoneOfInterface \"public\" \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.changeZoneOfInterface "public" "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:91" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:91"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryInterface \"public\" \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryInterface "public" "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:94" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:94"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryInterface \"drop\" \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryInterface "drop" "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:97" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:97"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addInterface \"public\" \"dummy1\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addInterface "public" "dummy1"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:100" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:100"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getInterfaces \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getInterfaces "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['dummy0', 'dummy1'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:103" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:103"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeInterface \"public\" \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeInterface "public" "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:106" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:106"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getInterfaces \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getInterfaces "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['dummy1'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:111" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:111"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addSource \"public\" \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addSource "public" "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:114" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:114"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.changeZoneOfSource \"drop\" \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.changeZoneOfSource "drop" "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('drop',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:117" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:117"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.querySource \"public\" \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.querySource "public" "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:120" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:120"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.querySource \"drop\" \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.querySource "drop" "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:123" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:123"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.changeZoneOfSource \"public\" \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.changeZoneOfSource "public" "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:126" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:126"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:126:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addSource \"public\" \"10.20.0.0/16\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:126"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addSource "public" "10.20.0.0/16"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:126"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:129" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:129"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:129:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getSources \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:129"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getSources "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['10.10.10.0/24', '10.20.0.0/16'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:129"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:132" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:132"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeSource \"public\" \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeSource "public" "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:132"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:135" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:135"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getSources \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getSources "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['10.20.0.0/16'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:140" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:140"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addService \"public\" \"samba\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addService "public" "samba" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:143" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:143"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryService \"public\" \"samba\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryService "public" "samba"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:146" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:146"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getServices \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getServices "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['ssh', 'dhcpv6-client', 'samba'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:146"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:149" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:149"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeService \"public\" \"samba\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeService "public" "samba"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:149"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:152" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:152"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:152:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryService \"public\" \"samba\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:152"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryService "public" "samba"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:152"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:157" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:157"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:157:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addProtocol \"public\" \"icmp\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:157"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addProtocol "public" "icmp" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:157"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:160" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:160"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:160:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryProtocol \"public\" \"icmp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:160"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryProtocol "public" "icmp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:160"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:163" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:163"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:163:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getProtocols \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:163"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getProtocols "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['icmp'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:163"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:166" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:166"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeProtocol \"public\" \"icmp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeProtocol "public" "icmp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:169" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:169"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:169:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryProtocol \"public\" \"icmp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:169"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryProtocol "public" "icmp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:174" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:174"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addPort \"public\" \"1234\" \"tcp\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addPort "public" "1234" "tcp" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:177" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:177"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:177:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryPort \"public\" \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:177"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryPort "public" "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:177"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:180" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:180"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:180:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addPort \"public\" \"4321\" \"udp\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:180"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addPort "public" "4321" "udp" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:180"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:183" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:183"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:183:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getPorts \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:183"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getPorts "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "([['1234', 'tcp'], ['4321', 'udp']],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:183"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:186" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:186"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:186:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removePort \"public\" \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:186"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removePort "public" "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:186"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:189" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:189"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:189:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryPort \"public\" \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:189"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryPort "public" "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:189"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:194" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:194"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:194:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addSourcePort \"public\" \"1234\" \"tcp\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:194"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addSourcePort "public" "1234" "tcp" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:194"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:197" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:197"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:197:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.querySourcePort \"public\" \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:197"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.querySourcePort "public" "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:197"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:200" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:200"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:200:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addSourcePort \"public\" \"4321\" \"udp\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:200"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addSourcePort "public" "4321" "udp" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:200"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:203" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:203"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:203:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getSourcePorts \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:203"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getSourcePorts "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "([['1234', 'tcp'], ['4321', 'udp']],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:203"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:206" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:206"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:206:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeSourcePort \"public\" \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:206"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeSourcePort "public" "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:206"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:209" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:209"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:209:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.querySourcePort \"public\" \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:209"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.querySourcePort "public" "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:209"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:214" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:214"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addForwardPort \"public\" \"1234\" \"tcp\" \"1111\" \"\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addForwardPort "public" "1234" "tcp" "1111" "" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:217" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:217"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryForwardPort \"public\" \"1234\" \"tcp\" \"1111\" \"\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryForwardPort "public" "1234" "tcp" "1111" ""; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:220" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:220"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:220:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addForwardPort \"public\" \"4321\" \"udp\" \"4444\" \"10.10.10.10\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:220"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addForwardPort "public" "4321" "udp" "4444" "10.10.10.10" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:220"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:223" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:223"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getForwardPorts \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getForwardPorts "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "([['1234', 'tcp', '1111', ''], ['4321', 'udp', '4444', '10.10.10.10']],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:226" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:226"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:226:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeForwardPort \"public\" \"1234\" \"tcp\" \"1111\" \"\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:226"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeForwardPort "public" "1234" "tcp" "1111" ""; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:229" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:229"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryForwardPort \"public\" \"1234\" \"tcp\" \"1111\" \"\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryForwardPort "public" "1234" "tcp" "1111" ""; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:234" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:234"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addMasquerade \"public\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addMasquerade "public" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:237" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:237"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:237:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryMasquerade \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:237"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryMasquerade "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:237"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:240" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:240"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:240:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeMasquerade \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:240"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeMasquerade "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:240"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:243" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:243"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryMasquerade \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryMasquerade "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:248" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:248"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:248:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addIcmpBlock \"public\" \"echo-reply\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:248"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addIcmpBlock "public" "echo-reply" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:248"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:251" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:251"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryIcmpBlock \"public\" \"echo-reply\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryIcmpBlock "public" "echo-reply"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:251"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:254" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:254"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addIcmpBlock \"public\" \"echo-request\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addIcmpBlock "public" "echo-request" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:257" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:257"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:257:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getIcmpBlocks \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:257"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getIcmpBlocks "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['echo-reply', 'echo-request'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:257"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:260" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:260"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:260:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeIcmpBlock \"public\" \"echo-reply\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:260"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeIcmpBlock "public" "echo-reply"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:260"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:263" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:263"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:263:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryIcmpBlock \"public\" \"echo-reply\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:263"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryIcmpBlock "public" "echo-reply"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:263"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:268" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:268"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addIcmpBlockInversion \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addIcmpBlockInversion "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:271" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:271"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:271:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryIcmpBlockInversion \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:271"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryIcmpBlockInversion "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:271"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:274" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:274"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeIcmpBlockInversion \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeIcmpBlockInversion "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:274"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:277" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:277"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryIcmpBlockInversion \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryIcmpBlockInversion "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:282" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:282"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addRichRule \"public\" \"rule family=ipv4 source address=10.10.10.10 accept\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addRichRule "public" "rule family=ipv4 source address=10.10.10.10 accept" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:285" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:285"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryRichRule \"public\" \"rule family=ipv4 source address=10.10.10.10 accept\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryRichRule "public" "rule family=ipv4 source address=10.10.10.10 accept"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:285"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:288" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:288"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:288:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getRichRules \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:288"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getRichRules "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['rule family=\"ipv4\" source address=\"10.10.10.10\" accept'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:291" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:291"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addRichRule \"public\" \"rule family=ipv4 source address=20.20.20.20 accept\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addRichRule "public" "rule family=ipv4 source address=20.20.20.20 accept" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:291"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:294" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:294"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:294:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryRichRule \"public\" \"rule family=ipv4 source address=20.20.20.20 accept\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:294"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryRichRule "public" "rule family=ipv4 source address=20.20.20.20 accept"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:297" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:297"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:297:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeRichRule \"public\" \"rule family=ipv4 source address=10.10.10.10 accept\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:297"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeRichRule "public" "rule family=ipv4 source address=10.10.10.10 accept"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:297"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:300" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:300"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryRichRule \"public\" \"rule family=ipv4 source address=10.10.10.10 accept\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryRichRule "public" "rule family=ipv4 source address=10.10.10.10 accept"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "zone_runtime_functional.at:308" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:308"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:308:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneSettings2 \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:308"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneSettings2 "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.'>
'egress_priority': <0>
'forward': <true>
'forward_ports': <[('4321', 'udp', '4444', '10.10.10.10')]>
'icmp_block_inversion': <false>
'icmp_blocks': <['echo-request']>
'ingress_priority': <0>
'interfaces': <['dummy1']>
'masquerade': <false>
'ports': <[('4321', 'udp')]>
'rules_str': <['rule family=\"ipv4\" source address=\"20.20.20.20\" accept']>
'services': <['ssh', 'dhcpv6-client']>
'short': <'Public'>
'source_ports': <[('4321', 'udp')]>
'sources': <['10.20.0.0/16']>
'target': <'default'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:308"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:329" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:329"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:329:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     \"public\"      '{\"services\": <[\"mdns\"]>,        \"ports\": <[(\"1234\", \"udp\")]>,        \"icmp_blocks\": <[\"echo-request\", \"echo-reply\"]>,        \"masquerade\": <false>,        \"forward\": <false>,        \"forward_ports\": <[(\"1234\", \"udp\", \"4321\", \"10.10.10.10\")]>,        \"interfaces\": <[\"dummy3\"]>,        \"sources\": <[\"10.10.10.0/24\"]>,        \"rules_str\": <[\"rule family=ipv4 source address=10.20.20.20 accept\"]>,        \"protocols\": <[\"ipv6-icmp\"]>,        \"source_ports\": <[(\"1234\", \"udp\")]>,        \"icmp_block_inversion\": <true>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:329"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     "public"      '{"services": <["mdns"]>,        "ports": <[("1234", "udp")]>,        "icmp_blocks": <["echo-request", "echo-reply"]>,        "masquerade": <false>,        "forward": <false>,        "forward_ports": <[("1234", "udp", "4321", "10.10.10.10")]>,        "interfaces": <["dummy3"]>,        "sources": <["10.10.10.0/24"]>,        "rules_str": <["rule family=ipv4 source address=10.20.20.20 accept"]>,        "protocols": <["ipv6-icmp"]>,        "source_ports": <[("1234", "udp")]>,        "icmp_block_inversion": <true>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:329"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:345" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:345"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneSettings2 \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneSettings2 "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.'>
'egress_priority': <0>
'forward': <false>
'forward_ports': <[('1234', 'udp', '4321', '10.10.10.10')]>
'icmp_block_inversion': <true>
'icmp_blocks': <['echo-reply', 'echo-request']>
'ingress_priority': <0>
'interfaces': <['dummy3']>
'masquerade': <false>
'ports': <[('1234', 'udp')]>
'protocols': <['ipv6-icmp']>
'rules_str': <['rule family=\"ipv4\" source address=\"10.20.20.20\" accept']>
'services': <['mdns']>
'short': <'Public'>
'source_ports': <[('1234', 'udp')]>
'sources': <['10.10.10.0/24']>
'target': <'default'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:345"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:365" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:365"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     \"public\"      '{\"services\": <[\"mdns\"]>,        \"ports\": <[(\"1234\", \"udp\")]>,        \"icmp_blocks\": <[\"echo-request\", \"echo-reply\"]>,        \"masquerade\": <false>,        \"forward_ports\": <[(\"1234\", \"udp\", \"4321\", \"10.10.10.10\")]>,        \"interfaces\": <[\"dummy3\"]>,        \"sources\": <[\"10.10.10.0/24\"]>,        \"rules_str\": <[\"rule family=ipv4 source address=10.20.20.20 accept\"]>,        \"protocols\": <[\"ipv6-icmp\"]>,        \"source_ports\": <[(\"1234\", \"udp\")]>,        \"icmp_block_inversion\": <true>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     "public"      '{"services": <["mdns"]>,        "ports": <[("1234", "udp")]>,        "icmp_blocks": <["echo-request", "echo-reply"]>,        "masquerade": <false>,        "forward_ports": <[("1234", "udp", "4321", "10.10.10.10")]>,        "interfaces": <["dummy3"]>,        "sources": <["10.10.10.0/24"]>,        "rules_str": <["rule family=ipv4 source address=10.20.20.20 accept"]>,        "protocols": <["ipv6-icmp"]>,        "source_ports": <[("1234", "udp")]>,        "icmp_block_inversion": <true>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:365"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:382" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:382"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:382:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     \"public\"      '{\"services\": <[\"mdns\", \"ssh\"]>,        \"icmp_blocks\": <[\"echo-reply\"]>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:382"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     "public"      '{"services": <["mdns", "ssh"]>,        "icmp_blocks": <["echo-reply"]>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:382"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:389" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:389"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:389:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     \"public\"      '{\"rules_str\": <@as []>,        \"icmp_block_inversion\": <false>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:389"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     "public"      '{"rules_str": <@as []>,        "icmp_block_inversion": <false>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:389"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:396" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:396"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:396:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     \"public\"      '{\"forward_ports\": <@a(ssss) []>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:396"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     "public"      '{"forward_ports": <@a(ssss) []>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:396"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:402" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:402"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:402:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     \"public\"      '{\"services\": <@as []>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:402"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     "public"      '{"services": <@as []>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:402"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:408" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:408"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:408:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneSettings2 \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:408"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneSettings2 "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.'>
'egress_priority': <0>
'forward': <false>
'icmp_block_inversion': <false>
'icmp_blocks': <['echo-reply']>
'ingress_priority': <0>
'interfaces': <['dummy3']>
'masquerade': <false>
'ports': <[('1234', 'udp')]>
'protocols': <['ipv6-icmp']>
'short': <'Public'>
'source_ports': <[('1234', 'udp')]>
'sources': <['10.10.10.0/24']>
'target': <'default'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:408"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "zone_runtime_functional.at:425" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/zone_runtime_functional.at:425"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_67
#AT_START_68
at_fn_group_banner 68 'policy_permanent_signatures.at:1' \
  "dbus api - policy permanent signatures" "         " 3
at_xfail=no
(
  $as_echo "68. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_signatures.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy_permanent_signatures.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy_permanent_signatures.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_signatures.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy_permanent_signatures.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy_permanent_signatures.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy_permanent_signatures.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy_permanent_signatures.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy_permanent_signatures.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy_permanent_signatures.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy_permanent_signatures.at:1"







    $as_echo "policy_permanent_signatures.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:8"
    $as_echo "policy_permanent_signatures.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:8"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"listPolicies\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="listPolicies"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"listPolicies\">
<arg direction=\"out\" type=\"ao\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_signatures.at:13" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:13"
    $as_echo "policy_permanent_signatures.at:13" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:13"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"getPolicyNames\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="getPolicyNames"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPolicyNames\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_signatures.at:18" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:18"
    $as_echo "policy_permanent_signatures.at:18" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:18"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"getPolicyByName\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="getPolicyByName"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPolicyByName\">
<arg direction=\"in\" name=\"policy\" type=\"s\"></arg>
<arg direction=\"out\" type=\"o\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_signatures.at:24" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:24"
    $as_echo "policy_permanent_signatures.at:24" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:24"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"addPolicy\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="addPolicy"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addPolicy\">
<arg direction=\"in\" name=\"policy\" type=\"s\"></arg>
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"></arg>
<arg direction=\"out\" type=\"o\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "policy_permanent_signatures.at:36" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:36"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName \"allow-host-ipv6\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName "allow-host-ipv6"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }



DBUS_POLICY_OBJ=$(sed -e "s/.*config\/policy\/\([^']\+\)['].*/\1/" ./stdout)
export DBUS_POLICY_OBJ


    $as_echo "policy_permanent_signatures.at:40" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:40"
    $as_echo "policy_permanent_signatures.at:40" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:40"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_POLICY_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.policy\"]//method[@name=\"getSettings\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_POLICY_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//method[@name="getSettings"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSettings\">
<arg direction=\"out\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_signatures.at:46" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:46"
    $as_echo "policy_permanent_signatures.at:46" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:46"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_POLICY_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.policy\"]//method[@name=\"update\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_POLICY_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//method[@name="update"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"update\">
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_signatures.at:51" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:51"
    $as_echo "policy_permanent_signatures.at:51" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:51"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_POLICY_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.policy\"]//signal[@name=\"Updated\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_POLICY_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//signal[@name="Updated"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"Updated\">
<arg name=\"name\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_signatures.at:57" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:57"
    $as_echo "policy_permanent_signatures.at:57" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:57"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:57:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_POLICY_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.policy\"]//method[@name=\"remove\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:57"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_POLICY_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//method[@name="remove"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"remove\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:57"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_signatures.at:61" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:61"
    $as_echo "policy_permanent_signatures.at:61" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:61"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_POLICY_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.policy\"]//signal[@name=\"Removed\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_POLICY_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//signal[@name="Removed"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"Removed\">
<arg name=\"name\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_signatures.at:67" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:67"
    $as_echo "policy_permanent_signatures.at:67" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:67"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_POLICY_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.policy\"]//method[@name=\"rename\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_POLICY_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//method[@name="rename"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"rename\">
<arg direction=\"in\" name=\"name\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_signatures.at:72" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:72"
    $as_echo "policy_permanent_signatures.at:72" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:72"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_POLICY_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.policy\"]//signal[@name=\"Renamed\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_POLICY_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//signal[@name="Renamed"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"Renamed\">
<arg name=\"name\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_signatures.at:78" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:78"
    $as_echo "policy_permanent_signatures.at:78" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:78"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_POLICY_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.policy\"]//method[@name=\"loadDefaults\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_POLICY_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//method[@name="loadDefaults"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"loadDefaults\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "policy_permanent_signatures.at:83" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy_permanent_signatures.at:83"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_68
#AT_START_69
at_fn_group_banner 69 'policy_runtime_signatures.at:1' \
  "dbus api - policy runtime signatures" "           " 3
at_xfail=no
(
  $as_echo "69. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_signatures.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy_runtime_signatures.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy_runtime_signatures.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_signatures.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy_runtime_signatures.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy_runtime_signatures.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy_runtime_signatures.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy_runtime_signatures.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy_runtime_signatures.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy_runtime_signatures.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy_runtime_signatures.at:1"






    $as_echo "policy_runtime_signatures.at:6" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:6"
    $as_echo "policy_runtime_signatures.at:6" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:6"

    { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.policy\"]//method[@name=\"getPolicySettings\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_signatures.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.policy"]//method[@name="getPolicySettings"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPolicySettings\">
<arg direction=\"in\" name=\"policy\" type=\"s\"></arg>
<arg direction=\"out\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_runtime_signatures.at:12" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:12"
    $as_echo "policy_runtime_signatures.at:12" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:12"

    { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.policy\"]//method[@name=\"setPolicySettings\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_signatures.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.policy"]//method[@name="setPolicySettings"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setPolicySettings\">
<arg direction=\"in\" name=\"policy\" type=\"s\"></arg>
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_runtime_signatures.at:18" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:18"
    $as_echo "policy_runtime_signatures.at:18" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:18"

    { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.policy\"]//signal[@name=\"PolicyUpdated\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_signatures.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.policy"]//signal[@name="PolicyUpdated"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"PolicyUpdated\">
<arg name=\"policy\" type=\"s\"></arg>
<arg name=\"settings\" type=\"a{sv}\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_runtime_signatures.at:26" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:26"
    $as_echo "policy_runtime_signatures.at:26" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:26"

    { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.policy\"]//method[@name=\"getPolicies\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_signatures.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.policy"]//method[@name="getPolicies"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPolicies\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_runtime_signatures.at:31" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:31"
    $as_echo "policy_runtime_signatures.at:31" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:31"

    { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.policy\"]//method[@name=\"getActivePolicies\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_signatures.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.policy"]//method[@name="getActivePolicies"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getActivePolicies\">
<arg direction=\"out\" type=\"a{sa{sas}}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "policy_runtime_signatures.at:37" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy_runtime_signatures.at:37"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_69
#AT_START_70
at_fn_group_banner 70 'policy_permanent_functional.at:1' \
  "dbus api - policy permanent functional" "         " 3
at_xfail=no
(
  $as_echo "70. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_functional.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy_permanent_functional.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy_permanent_functional.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_functional.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy_permanent_functional.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy_permanent_functional.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy_permanent_functional.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy_permanent_functional.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy_permanent_functional.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy_permanent_functional.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy_permanent_functional.at:1"







    $as_echo "policy_permanent_functional.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:8"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.listPolicies ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.listPolicies ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sed -e \"s/['][,]/'\\n/g\" ./stdout |          sed -e \"s/.*config\\/policy\\/\\([^']\\+\\)['].*/\\1/\" |          while read LINE; do { echo \"\${LINE}\" | grep \"^[0-9]\\+\$\" ; } || exit 1; done "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_functional.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sed -e "s/['][,]/'\n/g" ./stdout |          sed -e "s/.*config\/policy\/\([^']\+\)['].*/\1/" |          while read LINE; do { echo "${LINE}" | grep "^[0-9]\+$" ; } || exit 1; done
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:13" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:13"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyNames ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyNames ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['allow-host-ipv6'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_functional.at:17" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:17"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName \"allow-host-ipv6\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName "allow-host-ipv6"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sed -e \"s/.*config\\/policy\\/\\([^']\\+\\)['].*/\\1/\" ./stdout | grep \"^[0-9]\\+\$\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_functional.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sed -e "s/.*config\/policy\/\([^']\+\)['].*/\1/" ./stdout | grep "^[0-9]\+$"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:20" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:20"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addPolicy \"foobar\"      '{\"version\": <\"1.0\">,        \"short\": <\"foobar\">,        \"description\": <\"foobar policy\">,        \"target\": <\"CONTINUE\">,        \"services\": <[\"ssh\", \"mdns\"]>,        \"ports\": <[(\"1234\", \"tcp\"), (\"1234\", \"udp\")]>,        \"icmp_blocks\": <[\"echo-request\"]>,        \"masquerade\": <false>,        \"forward_ports\": <[(\"1234\", \"tcp\", \"4321\", \"\"), (\"1234\", \"udp\", \"4321\", \"\")]>,        \"rich_rules\": <[\"rule family=ipv4 source address=10.20.20.20 drop\"]>,        \"protocols\": <[\"icmp\"]>,        \"source_ports\": <[(\"1234\", \"tcp\"), (\"1234\", \"udp\")]>,        \"ingress_zones\": <[\"public\"]>,        \"egress_zones\": <[\"HOST\"]>,        \"priority\": <-100>       }'     ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addPolicy "foobar"      '{"version": <"1.0">,        "short": <"foobar">,        "description": <"foobar policy">,        "target": <"CONTINUE">,        "services": <["ssh", "mdns"]>,        "ports": <[("1234", "tcp"), ("1234", "udp")]>,        "icmp_blocks": <["echo-request"]>,        "masquerade": <false>,        "forward_ports": <[("1234", "tcp", "4321", ""), ("1234", "udp", "4321", "")]>,        "rich_rules": <["rule family=ipv4 source address=10.20.20.20 drop"]>,        "protocols": <["icmp"]>,        "source_ports": <[("1234", "tcp"), ("1234", "udp")]>,        "ingress_zones": <["public"]>,        "egress_zones": <["HOST"]>,        "priority": <-100>       }'     ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }



DBUS_FOOBAR_POLICY_OBJ=$(sed -e "s/.*config\/policy\/\([^']\+\)['].*/\1/" ./stdout)
export DBUS_FOOBAR_POLICY_OBJ



    $as_echo "policy_permanent_functional.at:46" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:46"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar policy'>
'egress_zones': <['HOST']>
'forward_ports': <[('1234', 'tcp', '4321', ''), ('1234', 'udp', '4321', '')]>
'icmp_blocks': <['echo-request']>
'ingress_zones': <['public']>
'masquerade': <false>
'ports': <[('1234', 'tcp'), ('1234', 'udp')]>
'priority': <-100>
'protocols': <['icmp']>
'rich_rules': <['rule family=\"ipv4\" source address=\"10.20.20.20\" drop']>
'services': <['ssh', 'mdns']>
'short': <'foobar'>
'source_ports': <[('1234', 'tcp'), ('1234', 'udp')]>
'target': <'CONTINUE'>
'version': <'1.0'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_functional.at:66" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:66"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{\"version\": <\"1.1\">,        \"short\": <\"foobar update\">,        \"description\": <\"foobar policy update\">,        \"target\": <\"DROP\">,        \"services\": <[\"mdns\"]>,        \"ports\": <[(\"1234\", \"udp\")]>,        \"icmp_blocks\": <[\"echo-request\", \"echo-reply\"]>,        \"masquerade\": <false>,        \"forward_ports\": <[(\"1234\", \"udp\", \"4321\", \"10.10.10.10\")]>,        \"rich_rules\": <[\"rule family=ipv4 source address=10.20.20.20 accept\"]>,        \"protocols\": <[\"ipv6-icmp\"]>,        \"source_ports\": <[(\"1234\", \"udp\")]>,        \"ingress_zones\": <[\"public\", \"external\"]>,        \"egress_zones\": <[\"internal\"]>,        \"priority\": <200>       }'     ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{"version": <"1.1">,        "short": <"foobar update">,        "description": <"foobar policy update">,        "target": <"DROP">,        "services": <["mdns"]>,        "ports": <[("1234", "udp")]>,        "icmp_blocks": <["echo-request", "echo-reply"]>,        "masquerade": <false>,        "forward_ports": <[("1234", "udp", "4321", "10.10.10.10")]>,        "rich_rules": <["rule family=ipv4 source address=10.20.20.20 accept"]>,        "protocols": <["ipv6-icmp"]>,        "source_ports": <[("1234", "udp")]>,        "ingress_zones": <["public", "external"]>,        "egress_zones": <["internal"]>,        "priority": <200>       }'     ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:84" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:84"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar policy update'>
'egress_zones': <['internal']>
'forward_ports': <[('1234', 'udp', '4321', '10.10.10.10')]>
'icmp_blocks': <['echo-request', 'echo-reply']>
'ingress_zones': <['public', 'external']>
'masquerade': <false>
'ports': <[('1234', 'udp')]>
'priority': <200>
'protocols': <['ipv6-icmp']>
'rich_rules': <['rule family=\"ipv4\" source address=\"10.20.20.20\" accept']>
'services': <['mdns']>
'short': <'foobar update'>
'source_ports': <[('1234', 'udp')]>
'target': <'DROP'>
'version': <'1.1'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_functional.at:103" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:103"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{\"version\": <\"1.2\">,        \"target\": <\"DROP\">       }'     ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{"version": <"1.2">,        "target": <"DROP">       }'     ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:109" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:109"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{\"version\": <\"1.3\">,        \"icmp_blocks\": <@as []>       }'     ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{"version": <"1.3">,        "icmp_blocks": <@as []>       }'     ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:115" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:115"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{\"version\": <\"1.4\">,        \"forward_ports\": <@a(ssss) []>       }'     ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{"version": <"1.4">,        "forward_ports": <@a(ssss) []>       }'     ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:121" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:121"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar policy update'>
'egress_zones': <['internal']>
'ingress_zones': <['public', 'external']>
'masquerade': <false>
'ports': <[('1234', 'udp')]>
'priority': <200>
'protocols': <['ipv6-icmp']>
'rich_rules': <['rule family=\"ipv4\" source address=\"10.20.20.20\" accept']>
'services': <['mdns']>
'short': <'foobar update'>
'source_ports': <[('1234', 'udp')]>
'target': <'DROP'>
'version': <'1.4'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:121"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_functional.at:137" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:137"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.rename \"foobar-renamed\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.rename "foobar-renamed"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:137"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:138" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:138"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName \"foobar-renamed\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName "foobar-renamed"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_functional.at:140" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:140"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.remove ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.remove ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:141" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:141"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName \"foobar-renamed\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName "foobar-renamed"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy_permanent_functional.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_functional.at:144" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:144"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:144:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName \"allow-host-ipv6\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:144"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName "allow-host-ipv6"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:144"
$at_failed && at_fn_log_failure
$at_traceon; }



DBUS_BUILTIN_POLICY_OBJ=$(sed -e "s/.*config\/policy\/\([^']\+\)['].*/\1/" ./stdout)
export DBUS_BUILTIN_POLICY_OBJ

    $as_echo "policy_permanent_functional.at:147" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:147"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_BUILTIN_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{\"version\": <\"1.2\">,        \"target\": <\"DROP\">       }'     ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_BUILTIN_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{"version": <"1.2">,        "target": <"DROP">       }'     ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:147"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:152" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:152"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:152:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_BUILTIN_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:152"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_BUILTIN_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'Allows basic IPv6 functionality for the host running firewalld.'>
'egress_zones': <['HOST']>
'ingress_zones': <['ANY']>
'masquerade': <false>
'priority': <-15000>
'rich_rules': <['rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept', 'rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept', 'rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept', 'rule family=\"ipv6\" icmp-type name=\"redirect\" accept']>
'short': <'Allow host IPv6'>
'target': <'DROP'>
'version': <'1.2'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:152"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_functional.at:164" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:164"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:164:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_BUILTIN_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.loadDefaults ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:164"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_BUILTIN_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.loadDefaults ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:164"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:165" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:165"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:165:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_BUILTIN_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:165"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_BUILTIN_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'Allows basic IPv6 functionality for the host running firewalld.'>
'egress_zones': <['HOST']>
'ingress_zones': <['ANY']>
'masquerade': <false>
'priority': <-15000>
'rich_rules': <['rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept', 'rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept', 'rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept', 'rule family=\"ipv6\" icmp-type name=\"redirect\" accept']>
'short': <'Allow host IPv6'>
'target': <'CONTINUE'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:165"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_POLICY: foobar-renamed/d'" != x"ignore"; then
            $as_echo "policy_permanent_functional.at:176" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_POLICY: foobar-renamed/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy_permanent_functional.at:176"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_70
#AT_START_71
at_fn_group_banner 71 'policy_runtime_functional.at:1' \
  "dbus api - policy runtime functional" "           " 3
at_xfail=no
(
  $as_echo "71. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_functional.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy_runtime_functional.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy_runtime_functional.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_functional.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy_runtime_functional.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy_runtime_functional.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy_runtime_functional.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy_runtime_functional.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy_runtime_functional.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy_runtime_functional.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy_runtime_functional.at:1"







    $as_echo "policy_runtime_functional.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:8"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getPolicySettings \"allow-host-ipv6\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getPolicySettings "allow-host-ipv6"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'Allows basic IPv6 functionality for the host running firewalld.'>
'egress_zones': <['HOST']>
'ingress_zones': <['ANY']>
'masquerade': <false>
'priority': <-15000>
'rich_rules': <['rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept', 'rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept', 'rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept', 'rule family=\"ipv6\" icmp-type name=\"redirect\" accept']>
'short': <'Allow host IPv6'>
'target': <'CONTINUE'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_runtime_functional.at:21" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:21"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     \"allow-host-ipv6\"      '{\"services\": <[\"mdns\"]>,        \"ports\": <[(\"1234\", \"udp\")]>,        \"icmp_blocks\": <[\"echo-request\"]>,        \"masquerade\": <false>,        \"forward_ports\": <[(\"1234\", \"udp\", \"4321\", \"\")]>,        \"rich_rules\": <[\"rule family=ipv4 source address=10.20.20.20 accept\"]>,        \"protocols\": <[\"ipv6-icmp\"]>,        \"source_ports\": <[(\"1234\", \"udp\")]>,        \"ingress_zones\": <[\"ANY\"]>,        \"egress_zones\": <[\"HOST\"]>       }'     ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     "allow-host-ipv6"      '{"services": <["mdns"]>,        "ports": <[("1234", "udp")]>,        "icmp_blocks": <["echo-request"]>,        "masquerade": <false>,        "forward_ports": <[("1234", "udp", "4321", "")]>,        "rich_rules": <["rule family=ipv4 source address=10.20.20.20 accept"]>,        "protocols": <["ipv6-icmp"]>,        "source_ports": <[("1234", "udp")]>,        "ingress_zones": <["ANY"]>,        "egress_zones": <["HOST"]>       }'     ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_runtime_functional.at:35" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:35"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getPolicySettings \"allow-host-ipv6\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getPolicySettings "allow-host-ipv6"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'Allows basic IPv6 functionality for the host running firewalld.'>
'egress_zones': <['HOST']>
'forward_ports': <[('1234', 'udp', '4321', '')]>
'icmp_blocks': <['echo-request']>
'ingress_zones': <['ANY']>
'masquerade': <false>
'ports': <[('1234', 'udp')]>
'priority': <-15000>
'protocols': <['ipv6-icmp']>
'rich_rules': <['rule family=\"ipv4\" source address=\"10.20.20.20\" accept']>
'services': <['mdns']>
'short': <'Allow host IPv6'>
'source_ports': <[('1234', 'udp')]>
'target': <'CONTINUE'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_runtime_functional.at:52" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:52"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     \"allow-host-ipv6\"      '{\"services\": <[\"mdns\"]>,        \"ports\": <[(\"1234\", \"udp\")]>,        \"icmp_blocks\": <[\"echo-request\"]>,        \"masquerade\": <false>,        \"forward_ports\": <[(\"1234\", \"udp\", \"4321\", \"\")]>,        \"rich_rules\": <[\"rule family=ipv4 source address=10.20.20.20 accept\"]>,        \"protocols\": <[\"ipv6-icmp\"]>,        \"source_ports\": <[(\"1234\", \"udp\")]>,        \"ingress_zones\": <[\"ANY\"]>,        \"egress_zones\": <[\"HOST\"]>       }'     ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     "allow-host-ipv6"      '{"services": <["mdns"]>,        "ports": <[("1234", "udp")]>,        "icmp_blocks": <["echo-request"]>,        "masquerade": <false>,        "forward_ports": <[("1234", "udp", "4321", "")]>,        "rich_rules": <["rule family=ipv4 source address=10.20.20.20 accept"]>,        "protocols": <["ipv6-icmp"]>,        "source_ports": <[("1234", "udp")]>,        "ingress_zones": <["ANY"]>,        "egress_zones": <["HOST"]>       }'     ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_runtime_functional.at:68" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:68"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     \"allow-host-ipv6\"      '{\"services\": <[\"mdns\", \"ssh\"]>,        \"icmp_blocks\": <[\"echo-reply\"]>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     "allow-host-ipv6"      '{"services": <["mdns", "ssh"]>,        "icmp_blocks": <["echo-reply"]>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_runtime_functional.at:75" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:75"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     \"allow-host-ipv6\"      '{\"rich_rules\": <@as []>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     "allow-host-ipv6"      '{"rich_rules": <@as []>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_runtime_functional.at:81" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:81"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:81:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     \"allow-host-ipv6\"      '{\"forward_ports\": <@a(ssss) []>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:81"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     "allow-host-ipv6"      '{"forward_ports": <@a(ssss) []>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:81"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_runtime_functional.at:87" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:87"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getPolicySettings \"allow-host-ipv6\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getPolicySettings "allow-host-ipv6"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'Allows basic IPv6 functionality for the host running firewalld.'>
'egress_zones': <['HOST']>
'icmp_blocks': <['echo-reply']>
'ingress_zones': <['ANY']>
'masquerade': <false>
'ports': <[('1234', 'udp')]>
'priority': <-15000>
'protocols': <['ipv6-icmp']>
'services': <['mdns', 'ssh']>
'short': <'Allow host IPv6'>
'source_ports': <[('1234', 'udp')]>
'target': <'CONTINUE'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_functional.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_functional.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }








    $as_echo "policy_runtime_functional.at:108" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:108"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getPolicies ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getPolicies ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['allow-host-ipv6'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:108"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_runtime_functional.at:112" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:112"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getActivePolicies ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getActivePolicies ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'allow-host-ipv6': {'ingress_zones': ['ANY'], 'egress_zones': ['HOST']}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "policy_runtime_functional.at:116" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy_runtime_functional.at:116"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_71
#AT_START_72
at_fn_group_banner 72 'direct.at:1' \
  "dbus api - direct signatures" "                   " 3
at_xfail=no
(
  $as_echo "72. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/direct.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "direct.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/direct.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "direct.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/direct.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "direct.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/direct.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "direct.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "direct.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/direct.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/direct.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "direct.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/direct.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "direct.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/direct.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "direct.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/direct.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "direct.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "direct.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/direct.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "direct.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/direct.at:1"







    $as_echo "direct.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:8"
    $as_echo "direct.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:8"

    { set +x
$as_echo "$at_srcdir/direct.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addChain\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="addChain"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addChain\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:17" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:17"
    $as_echo "direct.at:17" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:17"

    { set +x
$as_echo "$at_srcdir/direct.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addPassthrough\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="addPassthrough"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addPassthrough\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:25" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:25"
    $as_echo "direct.at:25" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:25"

    { set +x
$as_echo "$at_srcdir/direct.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="addRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addRule\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"in\" name=\"priority\" type=\"i\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:36" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:36"
    $as_echo "direct.at:36" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:36"

    { set +x
$as_echo "$at_srcdir/direct.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getAllChains\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getAllChains"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getAllChains\">
<arg direction=\"out\" type=\"a(sss)\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:43" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:43"
    $as_echo "direct.at:43" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:43"

    { set +x
$as_echo "$at_srcdir/direct.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getAllPassthroughs\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getAllPassthroughs"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getAllPassthroughs\">
<arg direction=\"out\" type=\"a(sas)\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:50" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:50"
    $as_echo "direct.at:50" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:50"

    { set +x
$as_echo "$at_srcdir/direct.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getAllRules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getAllRules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getAllRules\">
<arg direction=\"out\" type=\"a(sssias)\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:57" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:57"
    $as_echo "direct.at:57" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:57"

    { set +x
$as_echo "$at_srcdir/direct.at:57:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getChains\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:57"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getChains"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getChains\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"out\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:57"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:66" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:66"
    $as_echo "direct.at:66" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:66"

    { set +x
$as_echo "$at_srcdir/direct.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getPassthroughs\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getPassthroughs"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPassthroughs\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"out\" type=\"aas\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:74" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:74"
    $as_echo "direct.at:74" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:74"

    { set +x
$as_echo "$at_srcdir/direct.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getRules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getRules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getRules\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"out\" type=\"a(ias)\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:84" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:84"
    $as_echo "direct.at:84" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:84"

    { set +x
$as_echo "$at_srcdir/direct.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"passthrough\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="passthrough"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"passthrough\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:93" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:93"
    $as_echo "direct.at:93" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:93"

    { set +x
$as_echo "$at_srcdir/direct.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryChain\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryChain"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryChain\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:103" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:103"
    $as_echo "direct.at:103" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:103"

    { set +x
$as_echo "$at_srcdir/direct.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryPassthrough\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryPassthrough"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryPassthrough\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:112" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:112"
    $as_echo "direct.at:112" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:112"

    { set +x
$as_echo "$at_srcdir/direct.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryRule\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"in\" name=\"priority\" type=\"i\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:124" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:124"
    $as_echo "direct.at:124" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:124"

    { set +x
$as_echo "$at_srcdir/direct.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeAllPassthroughs\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeAllPassthroughs"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeAllPassthroughs\">
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:130" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:130"
    $as_echo "direct.at:130" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:130"

    { set +x
$as_echo "$at_srcdir/direct.at:130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeChain\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeChain"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeChain\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:130"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:139" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:139"
    $as_echo "direct.at:139" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:139"

    { set +x
$as_echo "$at_srcdir/direct.at:139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removePassthrough\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="removePassthrough"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removePassthrough\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:147" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:147"
    $as_echo "direct.at:147" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:147"

    { set +x
$as_echo "$at_srcdir/direct.at:147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeRule\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"in\" name=\"priority\" type=\"i\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:147"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:158" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:158"
    $as_echo "direct.at:158" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:158"

    { set +x
$as_echo "$at_srcdir/direct.at:158:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeRules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:158"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeRules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeRules\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:158"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:167" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:167"
    $as_echo "direct.at:167" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:167"

    { set +x
$as_echo "$at_srcdir/direct.at:167:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//signal[@name=\"ChainAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:167"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//signal[@name="ChainAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"ChainAdded\">
<arg name=\"ipv\" type=\"s\"></arg>
<arg name=\"table\" type=\"s\"></arg>
<arg name=\"chain\" type=\"s\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:167"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:176" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:176"
    $as_echo "direct.at:176" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:176"

    { set +x
$as_echo "$at_srcdir/direct.at:176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//signal[@name=\"ChainRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//signal[@name="ChainRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"ChainRemoved\">
<arg name=\"ipv\" type=\"s\"></arg>
<arg name=\"table\" type=\"s\"></arg>
<arg name=\"chain\" type=\"s\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:176"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:185" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:185"
    $as_echo "direct.at:185" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:185"

    { set +x
$as_echo "$at_srcdir/direct.at:185:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//signal[@name=\"PassthroughAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:185"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//signal[@name="PassthroughAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"PassthroughAdded\">
<arg name=\"ipv\" type=\"s\"></arg>
<arg name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:185"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:193" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:193"
    $as_echo "direct.at:193" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:193"

    { set +x
$as_echo "$at_srcdir/direct.at:193:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//signal[@name=\"PassthroughRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:193"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//signal[@name="PassthroughRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"PassthroughRemoved\">
<arg name=\"ipv\" type=\"s\"></arg>
<arg name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:193"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:201" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:201"
    $as_echo "direct.at:201" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:201"

    { set +x
$as_echo "$at_srcdir/direct.at:201:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//signal[@name=\"RuleAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:201"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//signal[@name="RuleAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"RuleAdded\">
<arg name=\"ipv\" type=\"s\"></arg>
<arg name=\"table\" type=\"s\"></arg>
<arg name=\"chain\" type=\"s\"></arg>
<arg name=\"priority\" type=\"i\"></arg>
<arg name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:201"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:212" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:212"
    $as_echo "direct.at:212" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:212"

    { set +x
$as_echo "$at_srcdir/direct.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//signal[@name=\"RuleRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//signal[@name="RuleRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"RuleRemoved\">
<arg name=\"ipv\" type=\"s\"></arg>
<arg name=\"table\" type=\"s\"></arg>
<arg name=\"chain\" type=\"s\"></arg>
<arg name=\"priority\" type=\"i\"></arg>
<arg name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "direct.at:227" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:227"
    $as_echo "direct.at:227" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:227"

    { set +x
$as_echo "$at_srcdir/direct.at:227:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"getSettings\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:227"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getSettings"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSettings\">
<arg direction=\"out\" type=\"(a(sss)a(sssias)a(sas))\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:227"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:234" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:234"
    $as_echo "direct.at:234" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:234"

    { set +x
$as_echo "$at_srcdir/direct.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"update\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="update"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"update\">
<arg direction=\"in\" name=\"settings\" type=\"(a(sss)a(sssias)a(sas))\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:241" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:241"
    $as_echo "direct.at:241" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:241"

    { set +x
$as_echo "$at_srcdir/direct.at:241:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"addChain\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:241"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="addChain"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addChain\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:241"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:250" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:250"
    $as_echo "direct.at:250" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:250"

    { set +x
$as_echo "$at_srcdir/direct.at:250:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"addPassthrough\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:250"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="addPassthrough"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addPassthrough\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:250"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:258" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:258"
    $as_echo "direct.at:258" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:258"

    { set +x
$as_echo "$at_srcdir/direct.at:258:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"addRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:258"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="addRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addRule\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"in\" name=\"priority\" type=\"i\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:258"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:269" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:269"
    $as_echo "direct.at:269" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:269"

    { set +x
$as_echo "$at_srcdir/direct.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"getAllChains\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getAllChains"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getAllChains\">
<arg direction=\"out\" type=\"a(sss)\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:276" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:276"
    $as_echo "direct.at:276" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:276"

    { set +x
$as_echo "$at_srcdir/direct.at:276:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"getAllPassthroughs\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:276"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getAllPassthroughs"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getAllPassthroughs\">
<arg direction=\"out\" type=\"a(sas)\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:283" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:283"
    $as_echo "direct.at:283" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:283"

    { set +x
$as_echo "$at_srcdir/direct.at:283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"getAllRules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getAllRules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getAllRules\">
<arg direction=\"out\" type=\"a(sssias)\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:283"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:290" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:290"
    $as_echo "direct.at:290" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:290"

    { set +x
$as_echo "$at_srcdir/direct.at:290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"getChains\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getChains"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getChains\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"out\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:299" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:299"
    $as_echo "direct.at:299" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:299"

    { set +x
$as_echo "$at_srcdir/direct.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"getPassthroughs\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getPassthroughs"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPassthroughs\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"out\" type=\"aas\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:307" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:307"
    $as_echo "direct.at:307" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:307"

    { set +x
$as_echo "$at_srcdir/direct.at:307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"getRules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getRules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getRules\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"out\" type=\"a(ias)\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:317" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:317"
    $as_echo "direct.at:317" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:317"

    { set +x
$as_echo "$at_srcdir/direct.at:317:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"queryChain\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:317"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="queryChain"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryChain\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:317"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:327" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:327"
    $as_echo "direct.at:327" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:327"

    { set +x
$as_echo "$at_srcdir/direct.at:327:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"queryPassthrough\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:327"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="queryPassthrough"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryPassthrough\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:327"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:336" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:336"
    $as_echo "direct.at:336" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:336"

    { set +x
$as_echo "$at_srcdir/direct.at:336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"queryRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="queryRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryRule\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"in\" name=\"priority\" type=\"i\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:336"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:348" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:348"
    $as_echo "direct.at:348" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:348"

    { set +x
$as_echo "$at_srcdir/direct.at:348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"removeChain\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="removeChain"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeChain\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:348"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:357" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:357"
    $as_echo "direct.at:357" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:357"

    { set +x
$as_echo "$at_srcdir/direct.at:357:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"removePassthrough\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:357"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="removePassthrough"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removePassthrough\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:357"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:365" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:365"
    $as_echo "direct.at:365" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:365"

    { set +x
$as_echo "$at_srcdir/direct.at:365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"removeRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="removeRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeRule\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"in\" name=\"priority\" type=\"i\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:365"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:376" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:376"
    $as_echo "direct.at:376" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:376"

    { set +x
$as_echo "$at_srcdir/direct.at:376:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"removeRules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:376"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="removeRules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeRules\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:385" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:385"
    $as_echo "direct.at:385" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:385"

    { set +x
$as_echo "$at_srcdir/direct.at:385:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//signal[@name=\"Updated\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:385"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//signal[@name="Updated"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"Updated\">
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:385"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "direct.at:391" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/direct.at:391"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_72
#AT_START_73
at_fn_group_banner 73 'firewall-cmd.at:5' \
  "basic options" "                                  " 4
at_xfail=no
(
  $as_echo "73. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "State: running

No options specified
usage: 'firewall-cmd --help' for usage information or see firewall-cmd(1) man page
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -h "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -h
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --help "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --help
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -V "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -V
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --complete-reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --complete-reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --panic-on "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --panic-on
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-panic "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-panic
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "yes
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --panic-off "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --panic-off
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-panic "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-panic
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "no
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:32" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:32"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_73
#AT_START_74
at_fn_group_banner 74 'firewall-cmd.at:34' \
  "get/list options" "                               " 4
at_xfail=no
(
  $as_echo "74. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:34"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:34"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:34"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:34"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:34" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:34"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:34"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:34" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:34"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:34" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:34"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-icmptypes "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-icmptypes "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-all-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:48" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:48"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_74
#AT_START_75
at_fn_group_banner 75 'firewall-cmd.at:50' \
  "default zone" "                                   " 4
at_xfail=no
(
  $as_echo "75. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:50"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:50"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:50"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:50"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:50" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:50"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:50"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:50" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:50"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:50" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:50"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-default-zone=\"home\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-default-zone="home"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "home
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-default-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-default-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:60" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:60"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_75
#AT_START_76
at_fn_group_banner 76 'firewall-cmd.at:62' \
  "user zone" "                                      " 4
at_xfail=no
(
  $as_echo "76. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:62"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:62"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:62"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:62"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:62" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:62"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:62"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:62" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:62"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:62" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:62"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --new-zone=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zones | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zones | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --get-target | grep default "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --get-target | grep default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:69:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=BAD "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:69"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=BAD
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/firewall-cmd.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%% "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%%
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --get-target | grep ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --get-target | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --add-service=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --add-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:77:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=123456789abcefghi "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:77"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=123456789abcefghi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=123456789abcefghij "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=123456789abcefghij
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 116 $at_status "$at_srcdir/firewall-cmd.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_TARGET: /d'              -e '/ERROR: INVALID_NAME: /d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:79" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_TARGET: /d'              -e '/ERROR: INVALID_NAME: /d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:79"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_76
#AT_START_77
at_fn_group_banner 77 'firewall-cmd.at:82' \
  "zone interfaces" "                                " 4
at_xfail=no
(
  $as_echo "77. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:82: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:82"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:82: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:82"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:82: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:82"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:82: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:82"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:82" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:82"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:82: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:82"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:82" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:82"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:82" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:82"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:85:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --add-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:85"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --add-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --change-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --change-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=block --add-interface=dummy1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=block --add-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=block --remove-interface=dummy1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=block --remove-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --change-zone=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --change-zone=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dmz
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --list-interfaces "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --remove-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --remove-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --change-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --change-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --remove-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --remove-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --get-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --get-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --get-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --set-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --get-zone-of-interface "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --get-zone-of-interface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-interface=perm_dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:121"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --list-interfaces "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "perm_dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:127"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --change-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:130"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:131"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --query-interface perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --change-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:136:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:136"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:136"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --query-interface perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=trusted --remove-interface=perm_dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=trusted --remove-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-interface=foobar+++ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-interface=foobar+++
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:146"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-interface=foobar+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:147"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:148:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:148"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
iifname \"foobar*\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar*\" jump filter_IN_public
iifname \"foobar*\" reject with icmpx admin-prohibited
iifname \"foobar++*\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar++*\" jump filter_IN_public
iifname \"foobar++*\" reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:148"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:163:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-interface=foobar+++ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:163"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-interface=foobar+++
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:163"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:164:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-interface=foobar+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:164"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:164"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:165:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-interface=foobar+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:165"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:165"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-interface=foobar+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:167:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:167"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:167"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:167:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:167"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:167"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: ZONE_CONFLICT: perm_dummy/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:168" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: ZONE_CONFLICT: perm_dummy/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:168"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_77
#AT_START_78
at_fn_group_banner 78 'firewall-cmd.at:170' \
  "zone sources" "                                   " 4
at_xfail=no
(
  $as_echo "78. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:170: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:170"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:170: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:170"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:170: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:170"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:170: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:170"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:170" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:170"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:170:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:170"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:170: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:170"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:170:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:170"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:170:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:170"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:170" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:170"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:170" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:170"











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public (default)
sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --query-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --change-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --remove-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --query-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public (default)
sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --query-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --change-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --remove-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --query-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.1/255.255.255.0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.1/255.255.255.0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public (default)
sources: 192.168.1.1/255.255.255.0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --query-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --query-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --change-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --change-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --remove-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --remove-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.1/255.255.255.0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.1/255.255.255.0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --query-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --query-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public (default)
sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --change-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --change-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --remove-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --remove-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public (default)
sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --query-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --change-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --change-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --remove-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --remove-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --query-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x" -e '/ERROR: ZONE_CONFLICT/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:221" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed  -e '/ERROR: ZONE_CONFLICT/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:221"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_78
#AT_START_79
at_fn_group_banner 79 'firewall-cmd.at:223' \
  "services" "                                       " 4
at_xfail=no
(
  $as_echo "79. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:223: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:223"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:223: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:223"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:223: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:223"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:223: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:223"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:223" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:223"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:223: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:223"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:223" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:223"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:223" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:223"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=dns --timeout 60 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:226"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=dns --timeout 60 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:227:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:227"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:227"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:228:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-service=dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:228"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:228"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service=dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:230:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=smtpssssssss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:230"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:230"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:231:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=dns --timeout "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:231"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=dns --timeout
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=dns --add-interface=dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:232"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=dns --timeout 60 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=dns --timeout 60
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-service dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:235"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --list-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dns ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:238:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-service dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:238"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:238"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --remove-service=dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --remove-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:244:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-service=dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:244"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=smtpssssssss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=dns --add-interface=dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:248:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=http --add-service=nfs --timeout=1h "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:248"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=http --add-service=nfs --timeout=1h
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:248"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:249"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:250:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service=nfs --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:250"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:250"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-service=nfs --remove-service=http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-service=nfs --remove-service=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:251"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-service=http --add-service=nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-service=http --add-service=nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-service http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:257:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-service=nfs --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:257"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:257"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:258:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-service=nfs --remove-service=http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:258"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-service=nfs --remove-service=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:258"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:263:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent  --query-service http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:263"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent  --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:263"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:264:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent  --query-service nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:264"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent  --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:264"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_SERVICE:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:265" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_SERVICE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:265"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_79
#AT_START_80
at_fn_group_banner 80 'firewall-cmd.at:267' \
  "user services" "                                  " 4
at_xfail=no
(
  $as_echo "80. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:267: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:267"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:267: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:267"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:267: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:267"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:267: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:267"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:267" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:267"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:267: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:267"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:267" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:267"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:267" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:267"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-service=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:272:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-service=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:272"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:272"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-services | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:275"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:276:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:276"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:278:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:278"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:281:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:281"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:281"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:283"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:284:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:284"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:285"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:287:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:287"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:287"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:288:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:288"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:289:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:289"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:289"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:291"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:294:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:294"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:296"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:297:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-protocol ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:297"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-protocol ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:297"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:298:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:298"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:298"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:302:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-module=sip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:302"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:302"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:303:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-module=sip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:303"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:303"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:304:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-module=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:304"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:304"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:305:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-module=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:305"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:305"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:306:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-module=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:306"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:306"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-module=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:309:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-helper=sip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:309"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-helper=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:309"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:310:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-helper=sip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:310"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-helper=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:310"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-helper=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:311"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:312:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-helper=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:312"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:312"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:313:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --get-service-helpers "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:313"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --get-service-helpers
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:313"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:316:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-helper=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:316"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:316"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:317:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-helper=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:317"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:317"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:319:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:319"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/firewall-cmd.at:319"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:320:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4:foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:320"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4:foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:320"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:321:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4:1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:321"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4:1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:321"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:322:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:322"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:322"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-destination=ipv6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-destination=ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:330:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-service=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:330"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:330"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:331:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-services | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:331"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:331"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:332:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-service=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:332"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:332"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:333:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-services | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:333"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:333"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./foobar-to-be-renamed <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="icmp" />
<port protocol="tcp" port="1234" />
</service>




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-service-from-file=\"./foobar-to-be-renamed\" --name=\"foobar-from-file\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-service-from-file="./foobar-to-be-renamed" --name="foobar-from-file"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-services | grep foobar-from-file "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-services | grep foobar-from-file
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:335"
$at_failed && at_fn_log_failure
$at_traceon; }




_ATEOF




        if test x"-e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:346" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:346"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_80
#AT_START_81
at_fn_group_banner 81 'firewall-cmd.at:349' \
  "ports" "                                          " 4
at_xfail=no
(
  $as_echo "81. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:349: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:349"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:349: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:349"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:349: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:349"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:349: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:349"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:349" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:349"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:349: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:349"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:349" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:349"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:349" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:349"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone home --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone home --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:353"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:354"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 254 $at_status "$at_srcdir/firewall-cmd.at:355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:356:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo --add-port bar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:356"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo --add-port bar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 254 $at_status "$at_srcdir/firewall-cmd.at:356"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:357:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=666/tcp --zone=public --timeout=30m "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:357"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=666/tcp --zone=public --timeout=30m
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:357"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:358:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:358"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:358"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:360:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=111-222/udp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:360"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:360"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:361:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:361"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:361"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:362"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=5000/sctp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port 5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=222/dccp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:370:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port 222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:370"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:370"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:371:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:371"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:371"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:373"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:374:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:374"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:374"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:376:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port=666/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:376"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:377:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=111-222/udp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:377"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:377"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:378:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:378"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:378"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:380:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:380"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:380"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:382:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:382"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:382"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:383:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=5000/sctp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:383"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:383"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:384:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port 5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:384"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:384"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:385:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:385"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:385"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:386:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:386"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:386"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:387:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=222/dccp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:387"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:387"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:388:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port 222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:388"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:388"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:389:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:389"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:389"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:391:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=80/tcp --add-port 443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:391"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:391"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:392:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=80/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:392"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:392"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:393:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:393"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:393"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port 80/tcp --remove-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:394"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:395:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=80/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:395"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:395"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:396:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:396"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:396"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:398:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=80/tcp --add-port 443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:398"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:398"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:399:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=80/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:399"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:399"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:400:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:400"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:400"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:401:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port 80/tcp --remove-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:401"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:401"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:402:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=80/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:402"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:402"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:403:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:403"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:403"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:404" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:404"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_81
#AT_START_82
at_fn_group_banner 82 'firewall-cmd.at:406' \
  "source ports" "                                   " 4
at_xfail=no
(
  $as_echo "82. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:406: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:406"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:406: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:406"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:406: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:406"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:406: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:406"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:406" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:406"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:406:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:406"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:406: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:406"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:406:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:406"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:406:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:406"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:406" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:406"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:406" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:406"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone home --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:409"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone home --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:410:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:410"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:410"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:411:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:411"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:411"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:412:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=666/tcp --zone=public --timeout=30m "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:412"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=666/tcp --zone=public --timeout=30m
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:412"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:413:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-source-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:413"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:413"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:414:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:414"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:415:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=111-222/udp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:415"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:415"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:416:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-source-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:416"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:416"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:417:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:417"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:417"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:419:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:419"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:419"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:420:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:420"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:420"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:421:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:421"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:421"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:422:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-source-port=666/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:422"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-source-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:422"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:423:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=111-222/udp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:423"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:423"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:424:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:424"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:424"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:425:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-source-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:425"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:425"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:426:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:426"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:426"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:428:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=80/tcp --add-source-port 443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:428"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:428"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:429:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=80/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:429"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:429"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:430:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:430"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:430"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-source-port 80/tcp --remove-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:431"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:432:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=80/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:432"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:432"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:433:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:433"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:433"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:435:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=80/tcp --add-source-port 443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:435"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:435"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:436:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=80/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:436"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:436"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:437:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:437"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:437"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:438:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-source-port 80/tcp --remove-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:438"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:438"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:439:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=80/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:439"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:439"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:440:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:440"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:440"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:441" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:441"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_82
#AT_START_83
at_fn_group_banner 83 'firewall-cmd.at:443' \
  "protocols" "                                      " 4
at_xfail=no
(
  $as_echo "83. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:443"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:443"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:443"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:443"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:443" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:443"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:443"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:443"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:443"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:443"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:443" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:443"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:443" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:443"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-protocol=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:446"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:447:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-protocol=dccp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:447"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:447"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:448:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:448"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:448"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:449:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:449"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:449"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:450:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:450"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:450"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:451:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-protocol=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:451"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:451"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-protocol=dccp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:452"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:453:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:453"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:453"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:454:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:454"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:454"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:455"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:457:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:457"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:457"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:458:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=ddp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:458"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:458"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:459"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:460:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-protocol ddp --remove-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:460"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:460"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:461:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:461"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:461"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:462:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:462"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:462"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:463:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:463"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:463"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:464:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=ddp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:464"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:464"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:465:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:465"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:465"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:466:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-protocol ddp --remove-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:466"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:466"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:467:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:467"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:467"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:468:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:468"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:468"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_PROTOCOL: dummy/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:469" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_PROTOCOL: dummy/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:469"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_83
#AT_START_84
at_fn_group_banner 84 'firewall-cmd.at:471' \
  "masquerade" "                                     " 4
at_xfail=no
(
  $as_echo "84. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:471: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:471"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:471: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:471"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:471: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:471"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:471: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:471"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:471" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:471"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:471:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:471"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:471: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:471"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:471:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:471"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:471:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:471"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:471" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:471"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:471" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:471"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:474:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-masquerade --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:474"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:476:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:476"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POST_public_allow {
meta nfproto ipv4 oifname != \"lo\" masquerade
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:476"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:488:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:488"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:488"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:489:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:489"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:489"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:490:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:490"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:490"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:492:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-masquerade --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:492"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:493:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:493"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:493"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:494:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:494"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:494"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:495:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:495"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:495"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:496" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:496"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_84
#AT_START_85
at_fn_group_banner 85 'firewall-cmd.at:498' \
  "forward" "                                        " 4
at_xfail=no
(
  $as_echo "85. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:498"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:498"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:498"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:498"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:498" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:498"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:498"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:498"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:498"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:498"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:498" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:498"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:498" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:498"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:501:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --add-interface=dummy --add-interface=dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:501"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --add-interface=dummy --add-interface=dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:502:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:502"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:502"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:503:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:503"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_home_allow {
oifname \"dummy\" accept
oifname \"dummy2\" accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:503"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:525:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --remove-interface=dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:525"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --remove-interface=dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:525"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:526:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:526"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_home_allow {
oifname \"dummy\" accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:526"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:539:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --add-interface=dummy3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:539"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --add-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:539"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:540:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:540"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_home_allow {
oifname \"dummy\" accept
oifname \"dummy3\" accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:540"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:556:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:556"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:556"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:557:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:557"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:557"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:558:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:558"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_home_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:558"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:568:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:568"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:568"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:569:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --remove-interface=dummy --remove-interface=dummy3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:569"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --remove-interface=dummy --remove-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:569"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:571:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=home --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:571"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=home --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:571"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:572:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=home --add-interface=dummy --add-interface=dummy3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:572"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=home --add-interface=dummy --add-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:572"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:573:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=home --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:573"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=home --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:573"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:574:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:574"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:574"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:574:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:574"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:574"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:575:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=home --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:575"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:575"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:576:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:576"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_home_allow {
oifname \"dummy\" accept
oifname \"dummy3\" accept
ip daddr 10.10.10.0/24 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:576"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:594:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=home --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:594"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=home --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:594"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:595:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=home --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:595"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:595"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:596:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=home --remove-interface=dummy --remove-interface=dummy3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:596"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=home --remove-interface=dummy --remove-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:596"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:597:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=home --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:597"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=home --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:597"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:598:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:598"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:598"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:598:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:598"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:598"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:601:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-default-zone |grep public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:601"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-default-zone |grep public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:602:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-interface dummy4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:602"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-interface dummy4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:602"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:603:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:603"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:603"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:604:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:604"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_public_allow {
oifname \"dummy4\" accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:604"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:619:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:619"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:619"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:620:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=1234::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:620"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=1234::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:620"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:623:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:623"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:623"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:624:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:624"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_internal_allow {
ip daddr 10.10.10.0/24 accept
ip6 daddr 1234::/64 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:624"
$at_failed && at_fn_log_failure
$at_traceon; }


















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:638:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=1234::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:638"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=1234::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:638"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:641:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:641"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_internal_allow {
ip daddr 10.10.10.0/24 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:641"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:653:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.20.20.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:653"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.20.20.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:653"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:654:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=4321::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:654"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=4321::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:654"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:657:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:657"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_internal_allow {
ip daddr 10.10.10.0/24 accept
ip daddr 10.20.20.0/24 accept
ip6 daddr 4321::/64 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:657"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:673:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:673"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:673"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:674:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:674"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_internal_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:674"
$at_failed && at_fn_log_failure
$at_traceon; }














        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:684" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:684"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_85
#AT_START_86
at_fn_group_banner 86 'firewall-cmd.at:686' \
  "forward ports" "                                  " 4
at_xfail=no
(
  $as_echo "86. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:686: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:686"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:686"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:686: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:686"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:686"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:686: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:686"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:686"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:686: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:686"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:686"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:686" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:686"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:686:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:686"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:686"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:686: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:686"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:686"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:686:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:686"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:686"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:686:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:686"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:686"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:686" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:686"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:686" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:686"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:689"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:690:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=11:proto=tcp:toport=22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:690"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:690"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:692:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:692"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PRE_public_allow {
meta nfproto ipv4 tcp dport 11 redirect to :22
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:692"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:704:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:704"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:704"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:705:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4444 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:705"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:705"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:706:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:706"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:706"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:708:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:708"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PRE_public_allow {
meta nfproto ipv4 tcp dport 33 dnat ip to 4.4.4.4
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:708"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:720:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:720"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:720"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:721:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:721"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:721"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:722:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:722"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:722"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:723:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:723"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:723"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:724:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:724"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:724"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:725:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:725"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:725"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:726:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:726"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:726"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:727:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:727"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:727"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:728:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:728"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:728"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:729:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:729"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:729"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:729:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:729"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PRE_public_allow {
meta nfproto ipv6 sctp dport 66 dnat ip6 to [fd00:dead:beef:ff0::]:66
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:729"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:729:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:729"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:729"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:729:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:729"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:729"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:729:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:729"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:729"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:748:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:748"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:748"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:749:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:749"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:749"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:750:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:750"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:750"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:751:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:751"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:751"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:752:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:752"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:752"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:753:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:753"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:753"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:754:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-forward-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:754"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:754"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:756"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:757:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=11:proto=tcp:toport=22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:757"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:757"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:758:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:758"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:758"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4444 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:759"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:760:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:760"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:760"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:761:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:761"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:761"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:762:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:762"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:762"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:763:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:763"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:763"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:764:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:764"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:764"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:765:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:765"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:765"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:766:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:766"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:766"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:767:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:767"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:767"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:768:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:768"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:768"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:769:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:769"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:769"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:770"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:770"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:770"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:770"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:776:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:776"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:776"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:777:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:777"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:777"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:778:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:778"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:778"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:779:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:779"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:779"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:780"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:781:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:781"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:781"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:782:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-forward-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:782"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:782"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:783" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:783"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_86
#AT_START_87
at_fn_group_banner 87 'firewall-cmd.at:785' \
  "ICMP block" "                                     " 4
at_xfail=no
(
  $as_echo "87. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:785"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:785"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:785"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:785"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:785" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:785"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:785"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:785"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:785"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:785"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:785" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:785"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:785" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:785"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-icmp-blocks "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:788"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-icmp-blocks
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:790:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=dummyblock "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:790"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:790"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:791:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:791"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:791"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:792:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:792"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:792"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:793:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --remove-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:793"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:793"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:794:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:794"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:794"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:795:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=dummyblock "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:795"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:795"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:796:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:796"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:796"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:797:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:797"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:797"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:798:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --remove-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:798"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:798"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:799:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:799"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:799"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:801:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:801"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:801"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:802:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:802"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:802"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:803:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:803"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:803"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:804"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:805:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-icmp-block-inversion --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:805"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:805"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:806:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:806"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:806"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:807:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:807"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:807"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:808:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:808"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:808"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:810:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=block "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:810"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=block
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:810"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:811:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=block "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:811"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=block
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:811"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:812:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=drop "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:812"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=drop
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:812"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:813:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=drop "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:813"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=drop
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:813"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:814:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=trusted "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:814"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:814"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:815:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=trusted "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:815"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:815"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:817:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:817"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:817"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:818:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:818"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:818"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:819:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:819"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:819"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:820:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:820"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:820"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:821:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:821"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:821"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:822:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:822"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:823:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:823"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:823"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:824:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:824"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:824"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:825:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:825"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:825"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:826:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:826"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:826"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:827:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:827"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:827"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:828:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:828"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:828"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_ICMPTYPE:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:829" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ICMPTYPE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:829"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_87
#AT_START_88
at_fn_group_banner 88 'firewall-cmd.at:831' \
  "user ICMP types" "                                " 4
at_xfail=no
(
  $as_echo "88. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:831"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:831"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:831"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:831"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:831" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:831"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:831"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:831"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:831"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:831"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:831" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:831"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:831" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:831"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:834:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-icmptype=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:834"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-icmptype=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:834"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:836:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-icmptype=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:836"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:836"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:837:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-icmptypes | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:837"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-icmptypes | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:837"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:839:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv5 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:839"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:839"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:840:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:840"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:840"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:841:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:841"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:841"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:842:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:842"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:842"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:843:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:843"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:843"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:844:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:844"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:844"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:845:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:845"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:845"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:847:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-icmp-block=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:847"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-icmp-block=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:847"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:848:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:848"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:848"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:850:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-icmptype=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:850"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:850"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:851:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:851"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:851"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/NAME_CONFLICT: new_icmptype():/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:852" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/NAME_CONFLICT: new_icmptype():/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:852"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_88
#AT_START_89
at_fn_group_banner 89 'firewall-cmd.at:854' \
  "ipset" "                                          " 4
at_xfail=no
(
  $as_echo "89. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:854"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:854"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:854"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:854"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:854" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:854"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:854"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:854"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:854"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:854"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:854" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:854"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:854" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:854"









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:857"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \\; } "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:857"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "firewall-cmd.at:857" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft flush set inet firewalld_check_ipset foobar >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:857"
                $as_echo "firewall-cmd.at:857" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout { type ipv4_addr \; timeout 600s \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:857"
                $as_echo "firewall-cmd.at:857" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_size { type ipv4_addr \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:857"
        $as_echo "firewall-cmd.at:857" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout_size { type ipv4_addr \; timeout 600s \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:857"

                $as_echo "firewall-cmd.at:857" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_interval_concat { type ipv4_addr . inet_service \; flags interval \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:857"
                $as_echo "firewall-cmd.at:857" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -j '{"nftables": [{"add": {"element": {"family": "inet", "table": "firewalld_check_ipset", "name": "foobar_interval_concat", "elem": [{"concat": [{"prefix": {"addr": "10.10.10.0", "len": 24}}, {"range": ["1234", "2000"]}]}]}}}]}' >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:857"


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:857"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:860:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:860"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:860"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:861:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:861"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:861"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:862:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:862"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:862"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:864:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:864"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:864"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:865:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries | grep \"1.2.3.4\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:865"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries | grep "1.2.3.4"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:865"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:866:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.400 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:866"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.400
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/firewall-cmd.at:866"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:867:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --remove-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:867"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --remove-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:867"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:868:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:868"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:868"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:871:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:871"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:871"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:872:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=ipset:foobar | grep public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:872"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=ipset:foobar | grep public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:872"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:873:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources | grep \"ipset:foobar\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:873"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources | grep "ipset:foobar"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:873"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:874:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --query-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:874"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --query-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:874"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:875:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:875"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:875"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:876:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --query-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:876"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --query-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:876"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:878:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:878"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:878"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:879:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:879"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:879"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:882:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:882"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:882"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:883:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10-10.10.10.12,1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:883"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10-10.10.10.12,1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:883"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:884:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,2000-2100 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:884"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,2000-2100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:884"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:885:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:885"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:885"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:885:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:885"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:885"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:886:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:886"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr . inet_proto . inet_service
flags interval
elements = { 10.10.10.10-10.10.10.12 . tcp . 1234,
10.10.10.10 . tcp . 2000-2100 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:886"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:896:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,8080 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:896"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:896"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:897:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:897"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:897"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:898:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:898"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:898"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:898:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:898"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:898"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:901:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:901"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:901"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:902:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:902"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:902"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:903:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,udp:1000-1002 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:903"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,udp:1000-1002
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:903"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:904:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:904"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:904"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:904:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:904"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:904"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:905:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.20,8080 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:905"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.20,8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:905"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:906:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:906"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:906"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:907:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:907"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr . inet_proto . inet_service
flags interval
elements = { 10.10.10.10 . sctp . 1234,
10.10.10.10 . udp . 1000-1002,
20.20.20.20 . tcp . 8080 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:907"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:918:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:918"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
ip saddr . meta l4proto . th sport @foobar jump filter_IN_policy_allow-host-ipv6
ip saddr . meta l4proto . th sport @foobar jump filter_IN_internal
ip saddr . meta l4proto . th sport @foobar reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:918"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:940:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,sctp:8080 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:940"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,sctp:8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:940"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:941:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:941"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:941"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:942:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:942"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:942"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:942:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:942"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:942"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:945:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,mark "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:945"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,mark
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:945"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:946:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,0x100 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:946"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,0x100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:946"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.20,0x200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.20,0x200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr . mark
flags interval
elements = { 10.10.10.10 . 0x00000100,
20.20.20.20 . 0x00000200 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:960:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:960"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
ip saddr . mark @foobar jump filter_IN_policy_allow-host-ipv6
ip saddr . mark @foobar jump filter_IN_internal
ip saddr . mark @foobar reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:960"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:979:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:979"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:979"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:980:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:980"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:980"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:980:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:980"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:980"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:983:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:net,port "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:983"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:net,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:983"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:984:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.0/24,sctp:1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:984"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.0/24,sctp:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:984"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:985:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:985"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:985"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:985:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:985"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:985"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:986:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,tcp:8080 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:986"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,tcp:8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:986"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:987:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:987"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:987"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:988:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:988"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:988"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:988:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:988"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:988"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:991:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port,net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:991"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port,net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:991"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:992:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234,10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:992"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234,10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:992"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:993:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:993"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:993"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:993:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:993"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:993"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:994:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,tcp:8080,1.6.0.0/16 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:994"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,tcp:8080,1.6.0.0/16
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:994"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:995:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:995"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr . inet_proto . inet_service . ipv4_addr
flags interval
elements = { 10.10.10.10 . sctp . 1234 . 10.10.10.0/24,
1.2.3.4 . tcp . 8080 . 1.6.0.0/16 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:995"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1016:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:net,iface "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1016"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:net,iface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1016"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1017:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.0/24,foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1017"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.0/24,foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1017"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1018:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1018"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1018"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1018:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1018"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1018"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1019:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.0/24,raboof0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1019"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.0/24,raboof0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1019"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1020:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1020"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1020"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1021:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1021"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr . ifname
flags interval
elements = { 10.10.10.0/24 . \"foobar0\",
20.20.20.0/24 . \"raboof0\" }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1021"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1031:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1031"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
ip saddr . oifname @foobar jump filter_IN_policy_allow-host-ipv6
ip saddr . oifname @foobar jump filter_IN_internal
ip saddr . oifname @foobar reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1031"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1050:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1050"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1050"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1051:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1051"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1051"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1051:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1051"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1051"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:mac "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1053"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:mac
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=12:34:56:78:90:ab "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1053"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=12:34:56:78:90:ab
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1053"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1053"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=12:34:56:78:90:ac "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1053"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=12:34:56:78:90:ac
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1053"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1053"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1053"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"-e '/ERROR: INVALID_ENTRY: invalid address/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1061" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ENTRY: invalid address/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1061"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_89
#AT_START_90
at_fn_group_banner 90 'firewall-cmd.at:1063' \
  "user helpers" "                                   " 4
at_xfail=no
(
  $as_echo "90. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1063: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1063"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1063"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1063: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1063"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1063"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1063: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1063"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1063"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1063: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1063"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1063"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1063" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1063"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1063:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1063"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1063"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1063: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1063"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1063"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1063:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1063"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1063"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1063:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1063"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1063"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1063" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1063"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1063" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1063"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1066:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-helper=foobar --module=foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1066"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-helper=foobar --module=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 132 $at_status "$at_srcdir/firewall-cmd.at:1066"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1067:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-helper=foobar --module=nf_conntrack_foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1067"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-helper=foobar --module=nf_conntrack_foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1067"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1068:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-helpers | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1068"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1068"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1069:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family | grep ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1069"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1069"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1070:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=ipv5 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1070"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1070"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1071:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1071"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1071"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1072:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family | grep ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1072"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1072"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1073:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family= "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1073"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1073"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1075:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1075"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1075"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1077:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1077"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1077"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1080:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --add-port=44/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1080"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --add-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1080"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1081:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports | grep 44 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1081"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports | grep 44
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1081"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1082:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --query-port=44/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1082"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1083:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --remove-port=44/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1083"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --remove-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1083"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1084:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --query-port=44/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1084"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1084"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1085:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1085"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1085"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1087:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-helper=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1087"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-helper=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1087"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1088:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-helpers | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1088"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1088"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_MODULE:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1089" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_MODULE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1089"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_90
#AT_START_91
at_fn_group_banner 91 'firewall-cmd.at:1091' \
  "direct" "                                         " 4
at_xfail=no
(
  $as_echo "91. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1091: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1091"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1091"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1091: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1091"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1091"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1091: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1091"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1091"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1091: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1091"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1091"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1091" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1091"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1091:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1091"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1091"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1091: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1091"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1091"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1091:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1091"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1091"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1091:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1091"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1091"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1091" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1091"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1091" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1091"






        $as_echo "firewall-cmd.at:1093" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1093"






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1095:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-chain ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1095"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1095"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1096:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-chains ipv4 filter | grep mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1096"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-chains ipv4 filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1096"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1097:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-chains | grep \"ipv4 filter mychain\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1097"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-chains | grep "ipv4 filter mychain"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1097"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1098:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-chain ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1098"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1098"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1099:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-chain ipv5 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1099"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-chain ipv5 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1099"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-chain ipv4 badtable mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-chain ipv4 badtable mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:1100"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules | grep \"ipv4 filter mychain 3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules | grep "ipv4 filter mychain 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1105"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1106"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1107"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv5 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv5 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1108"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 badtable mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 badtable mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:1109"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1111"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"3 -s 192.168.1.1 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "3 -s 192.168.1.1 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"4 -s 192.168.1.2 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "4 -s 192.168.1.2 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"5 -s 192.168.1.3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "5 -s 192.168.1.3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1117"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"6 -s 192.168.1.4 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "6 -s 192.168.1.4 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rules ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rules ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1119"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1120"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1121"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1122"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1123"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-chain ipv5 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-chain ipv5 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1125"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1126:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 badtable mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1126"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 badtable mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:1126"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1127"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-chain ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1128"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1129:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 filter dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1129"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 filter dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1129"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1132"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --list-all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1133"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1135"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1136:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --zone=home --list-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1136"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --zone=home --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1136"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --permanent --list-all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --permanent --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1137"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-chain ipv4 filter žluťoučký "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1140"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-chains ipv4 filter |grep \"žluťoučký\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-chains ipv4 filter |grep "žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1141"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-chains | grep \"ipv4 filter žluťoučký\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-chains | grep "ipv4 filter žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1142"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1143"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1144:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1144"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1144"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1145"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 filter žluťoučký 3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 filter žluťoučký 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1146"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1147"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1148:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1148"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1148"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1149"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-chain ipv4 filter žluťoučký "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1150"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1151:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1151"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1151"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1154:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1154"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1154"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1155:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter FORWARD_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1155"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter FORWARD_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1155"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1156:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 security INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1156"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 security INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1156"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1157:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 raw PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1157"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 raw PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1157"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1158:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 mangle PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1158"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 mangle PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1158"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1159:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 nat PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1159"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 nat PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1159"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1160:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1160"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1160"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1161"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1161"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1162" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1162"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_91
#AT_START_92
at_fn_group_banner 92 'firewall-cmd.at:1165' \
  "direct nat" "                                     " 4
at_xfail=no
(
  $as_echo "92. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1165: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1165"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1165"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1165: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1165"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1165"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1165: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1165"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1165"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1165: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1165"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1165"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1165" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1165"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1165:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1165"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1165"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1165: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1165"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1165"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1165:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1165"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1165"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1165:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1165"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1165"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1165" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1165"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1165" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1165"







        $as_echo "firewall-cmd.at:1168" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1168"




        KERNEL_MAJOR=`uname -r | cut -d. -f1`
        KERNEL_MINOR=`uname -r | cut -d. -f2`
        if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 18 || test ${KERNEL_MAJOR} -gt 4; then
            :
        else
            $as_echo "firewall-cmd.at:1169" >"$at_check_line_file"
at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1169"
        fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1173"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1174"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1175"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1176"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1177:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1177"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1177"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1178:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1178"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1178"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1179:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1179"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1179"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1180:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1180"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1180"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1181:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules |grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1181"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules |grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1181"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1182:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1182"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1182"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1183:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1183"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1183"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1184:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1184"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1184"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1185:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1185"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1185"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:1188" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1188"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_92
#AT_START_93
at_fn_group_banner 93 'firewall-cmd.at:1190' \
  "direct passthrough" "                             " 4
at_xfail=no
(
  $as_echo "93. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1190: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1190"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1190"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1190: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1190"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1190"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1190: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1190"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1190"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1190: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1190"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1190"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1190" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1190"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1190:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1190"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1190"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1190: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1190"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1190"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1190:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1190"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1190"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1190:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1190"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1190"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1190" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1190"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1190" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1190"






        $as_echo "firewall-cmd.at:1192" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1192"






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1194:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 --table mangle --append POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1194"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 --table mangle --append POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1194"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1195:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 --table mangle --delete POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1195"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 --table mangle --delete POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1195"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1197:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1197"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1197"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1198:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1198"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1198"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1199:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1199"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1199"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1200:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1200"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1200"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1201:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1201"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1201"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1202:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1202"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1202"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1203:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1203"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1203"
$at_failed && at_fn_log_failure
$at_traceon; }






    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1205:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-passthrough ipv6 --table filter --append FORWARD --destination fd00:dead:beef:ff0::/64 --in-interface dummy0 --out-interface dummy0 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1205"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-passthrough ipv6 --table filter --append FORWARD --destination fd00:dead:beef:ff0::/64 --in-interface dummy0 --out-interface dummy0 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1205"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1205:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-passthroughs ipv6 | grep \"fd00:dead:beef:ff0::/64\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1205"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-passthroughs ipv6 | grep "fd00:dead:beef:ff0::/64"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1205"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1205:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-passthroughs | grep \"fd00:dead:beef:ff0::/64\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1205"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-passthroughs | grep "fd00:dead:beef:ff0::/64"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1205"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1205:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -nvL | grep \"fd00:dead:beef:ff0::/64\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1205"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -nvL | grep "fd00:dead:beef:ff0::/64"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1205"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1205:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv6 --table filter --delete FORWARD --destination fd00:dead:beef:ff0::/64 --in-interface dummy0 --out-interface dummy0 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1205"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv6 --table filter --delete FORWARD --destination fd00:dead:beef:ff0::/64 --in-interface dummy0 --out-interface dummy0 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1205"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv5 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1214"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough --get-chains ipv4 filter "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough --get-chains ipv4 filter
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1216"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1218:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1218"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1218"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1219:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv5 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1219"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1219"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1220:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv4 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1220"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1220"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1221:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-passthroughs ipv4 | grep \"[-]nvL\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1221"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-passthroughs ipv4 | grep "[-]nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1221"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1222:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-passthroughs | grep \"ipv4 [-]nvL\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1222"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-passthroughs | grep "ipv4 [-]nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1222"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1223"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1224:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-passthrough ipv4 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1224"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1224"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1225:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1225"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1225"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/WARNING: NOT_ENABLED: passthrough/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1226" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/WARNING: NOT_ENABLED: passthrough/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1226"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_93
#AT_START_94
at_fn_group_banner 94 'firewall-cmd.at:1228' \
  "direct ebtables" "                                " 4
at_xfail=no
(
  $as_echo "94. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1228: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1228"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1228"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1228: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1228"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1228"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1228: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1228"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1228"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1228: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1228"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1228"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1228" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1228"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1228:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1228"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1228"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1228: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1228"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1228"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1228:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1228"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1228"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1228:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1228"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1228"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1228" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1228"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1228" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1228"






        $as_echo "firewall-cmd.at:1230" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1230"






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-chain eb filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1232"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1233:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-chains eb filter | grep mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1233"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1233"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1234"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule eb filter mychain 999 -p IPv6 --ip6-protocol UDP --ip6-source-port ! 12345 -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule eb filter mychain 999 -p IPv6 --ip6-protocol UDP --ip6-source-port ! 12345 -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1235"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-p IPv6 --ip6-proto udp ! --ip6-sport 12345 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1236"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1241:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1241"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1241"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1242:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1242"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 --ip6-proto udp ! --ip6-sport 12345 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1242"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1247:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule eb filter INPUT 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1247"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule eb filter INPUT 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1247"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1248:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule eb filter INPUT_direct 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1248"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule eb filter INPUT_direct 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1248"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-p IPv6 -j DROP
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1249"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1261:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rules eb filter INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1261"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rules eb filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1261"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1262:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rules eb filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1262"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rules eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1262"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1264:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-chain eb filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1264"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1264"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1265:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-chains eb filter | grep mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1265"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1265"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1266:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1266"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1266"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1267"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1267"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1268"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:1272" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1272"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_94
#AT_START_95
at_fn_group_banner 95 'firewall-cmd.at:1274' \
  "lockdown" "                                       " 4
at_xfail=no
(
  $as_echo "95. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1274: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1274"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1274"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1274: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1274"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1274"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1274: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1274"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1274"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1274: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1274"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1274"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1274" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1274"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1274"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1274: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1274"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1274"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1274"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1274"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1274" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1274"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1274" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1274"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1277"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1278:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1278"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1278"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-lockdown-whitelist-commands | grep \"/usr/bin/command\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1279"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1280"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1281:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1281"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1281"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1282"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1283"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1284:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-commands | grep \"/usr/bin/command\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1284"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1284"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1285"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1286"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1288:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1288"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1288"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1289:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1289"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1289"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1290"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1291"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1292"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1293"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1294:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1294"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1294"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1295"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1296"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1297:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1297"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1297"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1299"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1300"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1301:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-lockdown-whitelist-uids | grep \"6666\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1301"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1301"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1302:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1302"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1302"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1303:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1303"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1303"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1304:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-uid 6666x "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1304"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1304"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1305:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1305"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1305"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1306:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1306"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1306"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-uids | grep \"6666\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1307"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1308:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1308"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1308"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1309:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1309"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1309"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1310:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-uid 6666x "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1310"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1310"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1312:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1312"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1312"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1313:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1313"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1313"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1314:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-lockdown-whitelist-users | grep \"theboss\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1314"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1314"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1315:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1315"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1315"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1316:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1316"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1316"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1317:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1317"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1317"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1318:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1318"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1318"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1319:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-users | grep \"theboss\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1319"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1319"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1320:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1320"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1320"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1321:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1321"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1321"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "firewall-cmd.at:1323" >"$at_check_line_file"
(test `whoami` != 'root') \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1323"



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1324:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-user root "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1324"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-user root
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1324"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1325:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --lockdown-on "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1325"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --lockdown-on
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1325"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1326:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1326"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1326"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1327:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --lockdown-off "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1327"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --lockdown-off
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1327"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1328:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1328"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1328"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:1329" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1329"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_95
#AT_START_96
at_fn_group_banner 96 'firewall-cmd.at:1341' \
  "rich rules good" "                                " 4
at_xfail=no
(
  $as_echo "96. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1341: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1341"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1341"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1341: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1341"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1341"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1341: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1341"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1341"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1341: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1341"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1341"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1341" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1341"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1341:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1341"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1341"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1341: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1341"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1341"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1341:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1341"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1341"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1341:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1341"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1341"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1341" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1341"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1341" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1341"









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"igmp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"igmp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value=\"igmp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"igmp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"igmp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"igmp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"igmp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"igmp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1374" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1374"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_96
#AT_START_97
at_fn_group_banner 97 'firewall-cmd.at:1375' \
  "rich rules audit" "                               " 4
at_xfail=no
(
  $as_echo "97. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1375: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1375"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1375"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1375: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1375"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1375"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1375: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1375"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1375"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1375: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1375"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1375"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1375" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1375"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1375"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1375: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1375"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1375"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1375"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1375"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1375" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1375"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1375" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1375"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1378:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_log_audit "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1378"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_log_audit
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1378"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1378:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add chain inet firewalld_check_log_audit foobar { type filter hook input priority 0 \\; }  "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1378"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add chain inet firewalld_check_log_audit foobar { type filter hook input priority 0 \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1378"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "firewall-cmd.at:1378" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add rule inet firewalld_check_log_audit foobar log level audit >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1378"

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1378:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_log_audit "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1378"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_log_audit
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1378"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:1380" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1380"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_97
#AT_START_98
at_fn_group_banner 98 'firewall-cmd.at:1383' \
  "rich rules priority" "                            " 4
at_xfail=no
(
  $as_echo "98. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1383: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1383"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1383"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1383: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1383"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1383"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1383: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1383"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1383"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1383: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1383"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1383"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1383" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1383"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1383:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1383"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1383"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1383: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1383"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1383"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1383:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1383"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1383"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1383:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1383"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1383"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1383" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1383"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1383" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1383"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1386:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_log_audit "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1386"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_log_audit
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1386"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1386:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add chain inet firewalld_check_log_audit foobar { type filter hook input priority 0 \\; }  "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1386"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add chain inet firewalld_check_log_audit foobar { type filter hook input priority 0 \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1386"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "firewall-cmd.at:1386" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add rule inet firewalld_check_log_audit foobar log level audit >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1386"

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1386:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_log_audit "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1386"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_log_audit
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1386"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1389:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1389"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public {
jump filter_IN_public_pre
jump filter_IN_public_log
jump filter_IN_public_deny
jump filter_IN_public_allow
jump filter_IN_public_post
meta l4proto { icmp, ipv6-icmp } accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1389"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1401:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1401"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_public {
jump filter_FWD_public_pre
jump filter_FWD_public_log
jump filter_FWD_public_deny
jump filter_FWD_public_allow
jump filter_FWD_public_post
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1401"
$at_failed && at_fn_log_failure
$at_traceon; }






















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1448:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule port port=\"1111\" protocol=\"tcp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1448"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule port port="1111" protocol="tcp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1448"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1449:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 port port=\"1122\" protocol=\"tcp\" audit accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1449"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 port port="1122" protocol="tcp" audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1449"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1450:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule port port=\"2222\" protocol=\"tcp\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1450"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule port port="2222" protocol="tcp" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1450"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1451:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule port port=\"3333\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1451"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule port port="3333" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1451"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 port port=\"4444\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 port port="4444" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1452"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1453:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1453"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_log {
tcp dport 1111 log
tcp dport 1122 log level audit
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1453"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1461:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1461"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_deny {
tcp dport 2222 drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1461"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1468:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1468"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 accept
ip6 daddr fe80::/64 udp dport 546 accept
tcp dport 1122 accept
tcp dport 3333 accept
tcp dport 4444 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1468"
$at_failed && at_fn_log_failure
$at_traceon; }




























    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1506:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1506"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1506"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1506:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1506"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1506"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1509:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-32768 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1509"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-32768 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1509"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1510:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=32767 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1510"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=32767 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1510"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1511:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-32769 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1511"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-32769 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/firewall-cmd.at:1511"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1512:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=32768 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1512"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=32768 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/firewall-cmd.at:1512"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1513"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1513"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1517"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1518:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1518"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1518"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1519:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1519"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_post {
drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1519"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1532:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1532"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1532"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1533:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1533"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1533"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1534:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1534"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1534"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1535:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1535"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1535"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1536:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1536"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1536"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1537:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1537"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1537"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1540:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1540"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1540"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1541:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1541"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1541"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1542:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule log prefix=\"foobar: \"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1542"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule log prefix="foobar: "'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1542"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1543:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1543"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1543"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1543:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1543"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1543"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1546:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"10.10.0.0/16\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1546"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="10.10.0.0/16" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1546"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 source address=\"10.1.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 source address="10.1.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1547"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1548:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-1  source address=\"10.1.0.0/16\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1548"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-1  source address="10.1.0.0/16" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1548"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1550:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=0 forward-port port=\"222\"  protocol=\"tcp\" to-port=\"22\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1550"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=0 forward-port port="222"  protocol="tcp" to-port="22"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1550"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1551:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=0 forward-port port=\"2222\" protocol=\"tcp\" to-port=\"22\" to-addr=\"10.1.1.1\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1551"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=0 forward-port port="2222" protocol="tcp" to-port="22" to-addr="10.1.1.1"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1551"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1552:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 forward-port port=\"8888\" protocol=\"tcp\" to-port=\"80\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1552"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 forward-port port="8888" protocol="tcp" to-port="80"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1552"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1553:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 forward-port port=\"8080\" protocol=\"tcp\" to-port=\"80\" to-addr=\"10.1.1.1\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1553"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 forward-port port="8080" protocol="tcp" to-port="80" to-addr="10.1.1.1"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1553"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1554:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" priority=0 forward-port port=\"9090\" protocol=\"tcp\" to-port=\"90\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1554"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" priority=0 forward-port port="9090" protocol="tcp" to-port="90"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1554"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1554:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" priority=-123 forward-port port=\"999\" protocol=\"tcp\" to-port=\"99\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1554"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" priority=-123 forward-port port="999" protocol="tcp" to-port="99"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1554"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1554:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" priority=-123 forward-port port=\"9999\" protocol=\"tcp\" to-port=\"9999\" to-addr=\"1234::4321\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1554"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" priority=-123 forward-port port="9999" protocol="tcp" to-port="9999" to-addr="1234::4321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1554"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1559:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1559"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
ct state invalid drop
jump filter_INPUT_POLICIES
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1559"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1571:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1571"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_pre {
ip saddr 10.1.0.0/16 drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1571"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1578:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1578"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 accept
ip6 daddr fe80::/64 udp dport 546 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1578"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1586:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1586"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_public_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1586"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1592:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1592"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_public_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1592"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1598:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1598"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PRE_public_pre {
meta nfproto ipv6 tcp dport 999 redirect to :99
meta nfproto ipv6 tcp dport 9999 dnat ip6 to [1234::4321]:9999
meta nfproto ipv4 tcp dport 8888 redirect to :80
meta nfproto ipv4 tcp dport 8080 dnat ip to 10.1.1.1:80
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1598"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1608:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1608"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PRE_public_allow {
meta nfproto ipv4 tcp dport 222 redirect to :22
meta nfproto ipv4 tcp dport 2222 dnat ip to 10.1.1.1:22
meta nfproto ipv6 tcp dport 9090 redirect to :90
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1608"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1617:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1617"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POST_public_pre {
ip saddr 10.1.1.0/24 oifname != \"lo\" masquerade
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1617"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1624:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1624"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POST_public_allow {
ip saddr 10.10.0.0/16 oifname != \"lo\" masquerade
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1624"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1631:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1631"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_public_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1631"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1637:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1637"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_public_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1637"
$at_failed && at_fn_log_failure
$at_traceon; }
































































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1692:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1692"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1692"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1692:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1692"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1692"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1695:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule icmp-block name=\"destination-unreachable\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1695"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule icmp-block name="destination-unreachable"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1695"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1696:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10 icmp-block name=\"destination-unreachable\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1696"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10 icmp-block name="destination-unreachable"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1696"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1698:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1698"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1698"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1699:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10 icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1699"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10 icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1699"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1700:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1700"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_pre {
icmp destination-unreachable reject with icmpx admin-prohibited
icmpv6 destination-unreachable reject with icmpx admin-prohibited
icmp echo-request accept
icmpv6 echo-request accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1700"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1710:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1710"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_deny {
icmp destination-unreachable reject with icmpx admin-prohibited
icmpv6 destination-unreachable reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1710"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1718:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1718"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 accept
ip6 daddr fe80::/64 udp dport 546 accept
icmp echo-request accept
icmpv6 echo-request accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1718"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1728:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1728"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_public_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1728"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1734:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1734"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_public_deny {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1734"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1740:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1740"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_public_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1740"
$at_failed && at_fn_log_failure
$at_traceon; }














































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1781:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1781"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1781"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1781:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1781"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1781"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1784:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=70   service name=\"smtps\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1784"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=70   service name="smtps" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1784"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1785:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-111 service name=\"ntp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1785"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-111 service name="ntp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1785"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1786:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10  port port=\"1111\" protocol=\"tcp\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1786"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10  port port="1111" protocol="tcp" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1786"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1787:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-100 port port=\"1111\" protocol=\"tcp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1787"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-100 port port="1111" protocol="tcp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1787"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1788:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=\"-77\"    service name=\"smtp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1788"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority="-77"    service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1788"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1789:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=-111 service name=\"ntp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1789"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=-111 service name="ntp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1789"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1790:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-32768 source address=\"10.0.0.0/8\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1790"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-32768 source address="10.0.0.0/8" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1790"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1791:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-2 source address=\"10.0.0.0/8\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1791"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-2 source address="10.0.0.0/8" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1791"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1792:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-1 source address=\"10.0.0.0/8\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1792"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-1 source address="10.0.0.0/8" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1792"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1793:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-5 source address=\"10.10.10.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1793"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-5 source address="10.10.10.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1793"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1794:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-3 source address=\"10.100.100.0/24\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1794"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-3 source address="10.100.100.0/24" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1794"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1795:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=127  drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1795"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=127  drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1795"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1796:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=125 service name=\"imap\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1796"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=125 service name="imap" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1796"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1797:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=126 log prefix=\"DROPPED: \"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1797"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=126 log prefix="DROPPED: "'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1797"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1798:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=10  service name=\"ssh\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1798"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=10  service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1798"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1799:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=1   service name=\"http\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1799"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=1   service name="http" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1799"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1800:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=100 service name=\"https\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1800"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=100 service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1800"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1801:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=5   service name=\"https\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1801"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=5   service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1801"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1802:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=66  service name=\"smtp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1802"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=66  service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1802"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1803:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=66    service name=\"smtp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1803"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=66    service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1803"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=70    service name=\"smtps\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=70    service name="smtps" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1804"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1805:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=5     service name=\"https\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1805"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=5     service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1805"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1806:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=\"-77\" service name=\"smtp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1806"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority="-77" service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1806"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1807:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" priority=-3 source address=\"10.100.100.0/24\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1807"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" priority=-3 source address="10.100.100.0/24" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1807"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1808:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1808"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_pre {
ip saddr 10.0.0.0/8 log
tcp dport 1111 log
tcp dport 1111 drop
ip saddr 10.10.10.0/24 accept
ip saddr 10.0.0.0/8 log
ip saddr 10.0.0.0/8 drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1808"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1820:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1820"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 accept
ip6 daddr fe80::/64 udp dport 546 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1820"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1828:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1828"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_deny {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1828"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1834:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1834"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_log {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1834"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1840:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1840"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_post {
tcp dport 80 accept
tcp dport 22 accept
tcp dport 443 accept
tcp dport 143 accept
log prefix \"DROPPED: \"
drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1840"
$at_failed && at_fn_log_failure
$at_traceon; }







































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1895:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1895"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1895"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1896:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1896"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1896"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1896:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1896"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1896"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1900:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 service name=\"http\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1900"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 service name="http" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1900"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1901:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1901"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public (default, active)
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule priority=\"-32768\" family=\"ipv4\" source address=\"10.0.0.0/8\" log
rule priority=\"-100\" port port=\"1111\" protocol=\"tcp\" log
rule priority=\"-10\" port port=\"1111\" protocol=\"tcp\" drop
rule priority=\"-5\" family=\"ipv4\" source address=\"10.10.10.0/24\" accept
rule priority=\"-2\" family=\"ipv4\" source address=\"10.0.0.0/8\" log
rule priority=\"-1\" family=\"ipv4\" source address=\"10.0.0.0/8\" drop
rule service name=\"http\" accept
rule priority=\"1\" service name=\"http\" accept
rule priority=\"10\" service name=\"ssh\" accept
rule priority=\"100\" service name=\"https\" accept
rule priority=\"125\" service name=\"imap\" accept
rule priority=\"126\" log prefix=\"DROPPED: \"
rule priority=\"127\" drop
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1901"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d'              -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1933" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d'              -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1933"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_98
#AT_START_99
at_fn_group_banner 99 'firewall-cmd.at:1938' \
  "rich rules bad" "                                 " 4
at_xfail=no
(
  $as_echo "99. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1938: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1938"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1938"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1938: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1938"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1938"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1938: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1938"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1938"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1938: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1938"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1938"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1938" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1938"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1938"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1938: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1938"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1938"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1938"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1938"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1938" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1938"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1938" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1938"










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1945:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1945"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1945"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1945:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1945"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1945"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1946:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='name=\"dns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1946"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1946"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1946:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='name=\"dns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1946"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1946"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1947"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1948"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1949"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1950"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule bad_element' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule bad_element' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1951"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv5\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1952"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv5\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1952"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule name=\"dns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1953"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule name=\"dns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1953"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol=\"ah\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol=\"ah\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1954"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1955:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"ah\" accept drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1955"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1955"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1955:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" accept drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1955"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1955"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1956:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1956"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1956"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1956:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1956"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1956"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1957:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule service bad_attribute=\"dns\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1957"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1957"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1957:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service bad_attribute=\"dns\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1957"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1957"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1958"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='family=\"ipv6\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='family="ipv6" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='family=\"ipv6\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='family="ipv6" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 207 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 207 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 123 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 123 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"esp\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1964"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"esp\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1964"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1965:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" masquerade drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1965"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1965"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1965:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" masquerade drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1965"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1965"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1966:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1966"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1966"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1966:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1966"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1966"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1967:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1967"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1967"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1967:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1967"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1967"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1968:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule service name=\"ssh\" log prefix=\"RRClag4hrBx9XZXk+46c6QavQehyRGdy3tjs7gzc+xfSzsd2smjoQ2NCPami6zVyjHtPGziBuqSWT0KII7QbHkwjNMr9pzbcbPue9PMTb5zXlMPphDjeuDdC3QTCH9rGQHooa9LiDWr+DqNPkBs+vb8r50eb+yEQIyhQaiDrQ0sc\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1968"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule service name="ssh" log prefix="RRClag4hrBx9XZXk+46c6QavQehyRGdy3tjs7gzc+xfSzsd2smjoQ2NCPami6zVyjHtPGziBuqSWT0KII7QbHkwjNMr9pzbcbPue9PMTb5zXlMPphDjeuDdC3QTCH9rGQHooa9LiDWr+DqNPkBs+vb8r50eb+yEQIyhQaiDrQ0sc" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 141 $at_status "$at_srcdir/firewall-cmd.at:1968"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1968:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name=\"ssh\" log prefix=\"RRClag4hrBx9XZXk+46c6QavQehyRGdy3tjs7gzc+xfSzsd2smjoQ2NCPami6zVyjHtPGziBuqSWT0KII7QbHkwjNMr9pzbcbPue9PMTb5zXlMPphDjeuDdC3QTCH9rGQHooa9LiDWr+DqNPkBs+vb8r50eb+yEQIyhQaiDrQ0sc\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1968"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name="ssh" log prefix="RRClag4hrBx9XZXk+46c6QavQehyRGdy3tjs7gzc+xfSzsd2smjoQ2NCPami6zVyjHtPGziBuqSWT0KII7QbHkwjNMr9pzbcbPue9PMTb5zXlMPphDjeuDdC3QTCH9rGQHooa9LiDWr+DqNPkBs+vb8r50eb+yEQIyhQaiDrQ0sc" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 141 $at_status "$at_srcdir/firewall-cmd.at:1968"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1969:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"sctp\" nflog group=-1 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1969"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="sctp" nflog group=-1 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 142 $at_status "$at_srcdir/firewall-cmd.at:1969"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1969:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"sctp\" nflog group=-1 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1969"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="sctp" nflog group=-1 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 142 $at_status "$at_srcdir/firewall-cmd.at:1969"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1970:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" service name=\"https\" nflog queue-size=-1 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1970"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" service name="https" nflog queue-size=-1 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 143 $at_status "$at_srcdir/firewall-cmd.at:1970"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1970:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" service name=\"https\" nflog queue-size=-1 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1970"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" service name="https" nflog queue-size=-1 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 143 $at_status "$at_srcdir/firewall-cmd.at:1970"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1971:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" service name=\"https\" nflog queue-size=65536 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1971"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" service name="https" nflog queue-size=65536 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 143 $at_status "$at_srcdir/firewall-cmd.at:1971"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1971:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" service name=\"https\" nflog queue-size=65536 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1971"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" service name="https" nflog queue-size=65536 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 143 $at_status "$at_srcdir/firewall-cmd.at:1971"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d'               -e '/ERROR: INVALID_LOG_PREFIX:/d'               -e '/ERROR: INVALID_NFLOG_GROUP:/d'               -e '/ERROR: INVALID_NFLOG_QUEUE:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1973" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d'               -e '/ERROR: INVALID_LOG_PREFIX:/d'               -e '/ERROR: INVALID_NFLOG_GROUP:/d'               -e '/ERROR: INVALID_NFLOG_QUEUE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1973"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_99
#AT_START_100
at_fn_group_banner 100 'firewall-cmd.at:1981' \
  "config validation" "                              " 4
at_xfail=no
(
  $as_echo "100. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1981: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1981"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1981"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1981: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1981"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1981"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1981: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1981"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1981"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1981: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1981"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1981"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1981" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1981"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1981:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1981"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1981"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1981: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1981"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1981"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1981:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1981"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1981"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1981:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1981"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1981"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1981" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1981"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1981" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1981"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1985:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1985"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1985"
$at_failed && at_fn_log_failure
$at_traceon; }





        cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<rule ipv="ipv4" table="filter" chain="INPUT" priority="1">-j LOG</rule>
</direct>
_ATEOF

    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
<command name="/home/egarver/bin/python /usr/bin/firewall-config"/>
<selinux context="system_u:system_r:NetworkManager_t:s0"/>
<selinux context="system_u:system_r:virtd_t:s0-s0:c0.c1023"/>
<user id="0"/>
</whitelist>
_ATEOF





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2003:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2003"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2003"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2003:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2003"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2003"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2004:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2004"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2004"
$at_failed && at_fn_log_failure
$at_traceon; }






        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2009: cp ./firewalld.conf ./firewalld.conf.orig"
at_fn_check_prepare_trace "firewall-cmd.at:2009"
( $at_check_trace; cp ./firewalld.conf ./firewalld.conf.orig
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2009"
$at_failed && at_fn_log_failure
$at_traceon; }

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2010: echo \"SomeBogusField=yes\" >> ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:2010"
( $at_check_trace; echo "SomeBogusField=yes" >> ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2010"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2011"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2016: cp ./firewalld.conf.orig ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:2016"
( $at_check_trace; cp ./firewalld.conf.orig ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2016"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<chain table="filter" ipv="ipv7" chain="foobar"/>
</direct>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:2025"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<rule />
</direct>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2033:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2033"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2033"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2034: rm ./direct.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2034"
( $at_check_trace; rm ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2034"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <user uid="666"/>
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2043:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2043"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2043"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <uid id="666"/>
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2051:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2051"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2051"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <group name="foobar" />
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2059:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2059"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2059"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2060: rm ./lockdown-whitelist.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2060"
( $at_check_trace; rm ./lockdown-whitelist.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2060"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2063: mkdir -p ./ipsets"
at_fn_check_prepare_trace "firewall-cmd.at:2063"
( $at_check_trace; mkdir -p ./ipsets
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2063"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry>12:34:56:78:90</entry>
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2070:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2070"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2070"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry bogus_attr="bogus">12:34:56:78:90:ab</entry>
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2082:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2082"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2082"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:ip,bogus">
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2089:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2089"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 119 $at_status "$at_srcdir/firewall-cmd.at:2089"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2090: rm ./ipsets/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2090"
( $at_check_trace; rm ./ipsets/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2090"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2093: mkdir -p ./helpers"
at_fn_check_prepare_trace "firewall-cmd.at:2093"
( $at_check_trace; mkdir -p ./helpers
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2093"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper>
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2099:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2099"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2099"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv7" module="nf_conntrack_ftp">
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:2106"
$at_failed && at_fn_log_failure
$at_traceon; }








    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv6" module="nf_conntrack_ftp">
<port protocol="aoeui" port="666" />
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2108"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2117: rm ./helpers/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2117"
( $at_check_trace; rm ./helpers/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2117"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2120: mkdir -p ./icmptypes"
at_fn_check_prepare_trace "firewall-cmd.at:2120"
( $at_check_trace; mkdir -p ./icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2120"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<bad_element />
<icmptype>
</icmptype>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2127"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<icmptype>
<destination unexpected_attr="foobar" />
</icmptype>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2135"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2136: rm ./icmptypes/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2136"
( $at_check_trace; rm ./icmptypes/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2136"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2139: mkdir -p ./services"
at_fn_check_prepare_trace "firewall-cmd.at:2139"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2139"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="aoeui" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2146"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol bad_attr="foo" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2154:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2154"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2154"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<bad_element />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2162:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2162"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2162"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<module module="bad_attr" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2170:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2170"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2170"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="aoeu" port="666" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2178:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2178"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2178"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="ssssssh" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2186:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2186"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:2186"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="22" />
<source-port protocol="tcp" port="sssssh" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2195:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2195"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:2195"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<destination ipv4="224.0.0.1" ipv7="1234" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2203:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2203"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2203"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2204: rm ./services/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2204"
( $at_check_trace; rm ./services/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2204"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2207: mkdir -p ./zones"
at_fn_check_prepare_trace "firewall-cmd.at:2207"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2207"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/firewall-cmd.at:2211"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<service name="bogus_service_name" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2219:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2219"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:2219"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port protocol="ipv4" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2227:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2227"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2227"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<protocol value="thisdoesnotexist" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2235"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-block invalid_attr=""/>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2243"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-type />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2251"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<masquerade value="true" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2259:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2259"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2259"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port port="666" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2267"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port protocol="sctppp" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2275"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="-1" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2283"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<interface />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2291"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2299"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<limit />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2314:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2314"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2314"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<accept>
<limit value="none" />
</accept>
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2327:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2327"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2327"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<service name="bitcoin" />
<log prefix="WtsDMDAMJvd24wejRBsImI2VSkBaAlo1h2TVgEmH5CpL1YjdCTnjO8mizyp4cBDNq9NXS6QAuRnq/vF5xsid1orzY4jKzaWhm5qrktZLi38jinLFixX97d5JcM9o5tSx9XwQyaHUJMmxcjKYrDQ2Pvo1KMgf4f7yDAcKJaoJiNYp" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2342:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2342"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2342"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<log level="super_critical" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2357:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2357"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2357"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<forward-port port="1234" protocol="tcp" to-port="4321" to-addr="10.0.0.1" />
<nflog group="65536" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2372:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2372"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2372"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<port port="1234" protocol="tcp" />
<nflog queue-size="-1" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2387:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2387"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2387"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<audit prefix="foobar" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2402:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2402"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2402"
$at_failed && at_fn_log_failure
$at_traceon; }








    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv6">
<source address="10.0.0.1/24" />
<accept />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2404:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2404"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2404"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2420: rm ./zones/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2420"
( $at_check_trace; rm ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2420"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"-e '/ERROR:/d'              -e '/WARNING:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:2422" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR:/d'              -e '/WARNING:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:2422"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_100
#AT_START_101
at_fn_group_banner 101 'rhbz1514043.at:1' \
  "--set-log-denied does not zero config" "          " 5
at_xfail=no
(
  $as_echo "101. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --set-log-denied=all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --set-log-denied=all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=public --add-service=samba "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=public --add-service=samba
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "services: dhcpv6-client samba ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
ct state invalid log prefix \"STATE_INVALID_DROP: \"
ct state invalid drop
jump filter_INPUT_POLICIES
log prefix \"FINAL_REJECT: \"
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
ct state invalid log prefix \"STATE_INVALID_DROP: \"
ct state invalid drop
ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } log prefix \"RFC3964_IPv4_REJECT: \" reject with icmpv6 addr-unreachable
jump filter_FORWARD_POLICIES
log prefix \"FINAL_REJECT: \"
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }






















        if test x"" != x"ignore"; then
            $as_echo "rhbz1514043.at:84" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:84"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_101
#AT_START_102
at_fn_group_banner 102 'rhbz1498923.at:1' \
  "invalid direct rule causes reload error" "        " 5
at_xfail=no
(
  $as_echo "102. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"






        $as_echo "rhbz1498923.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1498923.at:3"



{ set +x
$as_echo "$at_srcdir/rhbz1498923.at:6: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:6"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "no zone
" | \
  $at_diff - "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1498923.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/rhbz1498923.at:18: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:18"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 8080 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 8080 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 1 --a-bogus-flag "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 1 --a-bogus-flag
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --direct --add-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --direct --add-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1498923.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1498923.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "failed
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1498923.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:39: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --direct --remove-rule ipv4 filter INPUT 1 --a-bogus-flag"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --direct --remove-rule ipv4 filter INPUT 1 --a-bogus-flag" "rhbz1498923.at:39"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --direct --remove-rule ipv4 filter INPUT 1 --a-bogus-flag
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/.*a-bogus-flag.*/d'" != x"ignore"; then
            $as_echo "rhbz1498923.at:47" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/.*a-bogus-flag.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:47"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_102
#AT_START_103
at_fn_group_banner 103 'pr181.at:1' \
  "combined zones name length check" "               " 5
at_xfail=no
(
  $as_echo "103. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/pr181.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/pr181.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/pr181.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/pr181.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "pr181.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr181.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/pr181.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/pr181.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/pr181.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/pr181.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "pr181.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr181.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "pr181.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:1"





{ set +x
$as_echo "$at_srcdir/pr181.at:4: mkdir -p ./zones/foobar"
at_fn_check_prepare_trace "pr181.at:4"
( $at_check_trace; mkdir -p ./zones/foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/pr181.at:6: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:6"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:7: echo '<zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:7"
( $at_check_trace; echo '<zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:8: echo '<short>foobar</short>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:8"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:9: echo '<description>foobar desc</description>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:9"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:10: echo '<service name=\"ssh\"/>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:10"
( $at_check_trace; echo '<service name="ssh"/>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:11: echo '</zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:11"
( $at_check_trace; echo '</zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/pr181.at:13: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:13"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:14: echo '<zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:14"
( $at_check_trace; echo '<zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:15: echo '<short>foobar</short>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:15"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:16: echo '<description>foobar desc</description>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:16"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:17: echo '<service name=\"http\"/>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:17"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:18: echo '</zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:18"
( $at_check_trace; echo '</zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/pr181.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/pr181.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/pr181.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=foobar --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=foobar --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "services: http ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "pr181.at:24" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:24"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_103
#AT_START_104
at_fn_group_banner 104 'gh287.at:1' \
  "ICMP block inversion" "                           " 5
at_xfail=no
(
  $as_echo "104. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh287.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh287.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh287.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh287.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh287.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh287.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh287.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh287.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh287.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh287.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh287.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh287.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh287.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:1"





{ set +x
$as_echo "$at_srcdir/gh287.at:4: mkdir -p ./zones"
at_fn_check_prepare_trace "gh287.at:4"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:5: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:5"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:6: echo '<zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:6"
( $at_check_trace; echo '<zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:7: echo '<short>foobar</short>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:7"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:8: echo '<description>foobar desc</description>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:8"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:9: echo '<service name=\"http\"/>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:9"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:10: echo '<source address=\"172.16.0.0/12\" />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:10"
( $at_check_trace; echo '<source address="172.16.0.0/12" />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:11: echo '<icmp-block-inversion />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:11"
( $at_check_trace; echo '<icmp-block-inversion />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:12: echo '</zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:12"
( $at_check_trace; echo '</zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh287.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh287.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "gh287.at:15" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:15"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_104
#AT_START_105
at_fn_group_banner 105 'individual_calls.at:1' \
  "individual calls" "                               " 5
at_xfail=no
(
  $as_echo "105. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/individual_calls.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "individual_calls.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/individual_calls.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/individual_calls.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/individual_calls.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/individual_calls.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "individual_calls.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "individual_calls.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"





{ set +x
$as_echo "$at_srcdir/individual_calls.at:4: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:4"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/individual_calls.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/individual_calls.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "individual_calls.at:7" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:7"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_105
#AT_START_106
at_fn_group_banner 106 'rhbz1534571.at:3' \
  "rule deduplication" "                             " 5
at_xfail=no
(
  $as_echo "106. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:3"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:3"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service nfs --add-service nfs3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service nfs --add-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-service nfs3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-service nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-service nfs --add-service nfs3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-service nfs --add-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-service nfs3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-service nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1534571.at:17" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_106
#AT_START_107
at_fn_group_banner 107 'gh290.at:1' \
  "invalid syntax in xml files" "                    " 5
at_xfail=no
(
  $as_echo "107. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh290.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh290.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh290.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh290.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh290.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh290.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh290.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh290.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh290.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:1"






        $as_echo "gh290.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh290.at:3"



{ set +x
$as_echo "$at_srcdir/gh290.at:6: mkdir -p ./zones"
at_fn_check_prepare_trace "gh290.at:6"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:7: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./direct.xml"
at_fn_check_prepare_trace "gh290.at:7"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:8: echo '<direct>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:8"
( $at_check_trace; echo '<direct>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:9: echo '<chain table=\"filter\" chain=\"some_chain_name\" ipv=\"ipv4\"/>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:9"
( $at_check_trace; echo '<chain table="filter" chain="some_chain_name" ipv="ipv4"/>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:10: echo '<rule table=\"filter\" chain=\"some_chain_name\" ipv=\"ipv4\" priority=\"1\">--destination 127.0.0.1 --jump RETURN' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:10"
( $at_check_trace; echo '<rule table="filter" chain="some_chain_name" ipv="ipv4" priority="1">--destination 127.0.0.1 --jump RETURN' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:12: echo '</direct>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:12"
( $at_check_trace; echo '</direct>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }




    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:14" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:14"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:14" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:14"



    { set +x
$as_echo "$at_srcdir/gh290.at:15: grep \"ERROR:.*mismatched tag\" ./firewalld.log"
at_fn_check_prepare_trace "gh290.at:15"
( $at_check_trace; grep "ERROR:.*mismatched tag" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"-e '/ERROR:.*mismatched tag.*/d'" != x"ignore"; then
            $as_echo "gh290.at:16" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR:.*mismatched tag.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:16"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_107
#AT_START_108
at_fn_group_banner 108 'gh290.at:19' \
  "invalid syntax in xml files" "                    " 5
at_xfail=no
(
  $as_echo "108. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh290.at:19: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:19"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh290.at:19: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh290.at:19"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh290.at:19: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:19"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh290.at:19: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:19"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh290.at:19" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:19"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh290.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh290.at:19: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:19"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh290.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh290.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:19" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:19"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:19" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:19"





{ set +x
$as_echo "$at_srcdir/gh290.at:23: mkdir -p ./zones"
at_fn_check_prepare_trace "gh290.at:23"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:24: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:24"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:25: echo '<zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:25"
( $at_check_trace; echo '<zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:26: echo '<short>foobar</short>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:26"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:28: echo '<port port=\"22\" />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:28"
( $at_check_trace; echo '<port port="22" />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:29: echo '<service name=\"http\"/>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:29"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:30: echo '</zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:30"
( $at_check_trace; echo '</zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }




    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:32" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:32"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE="251"
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:32" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:32"



    { set +x
$as_echo "$at_srcdir/gh290.at:33: grep \"ERROR:.*Missing attribute protocol for port\" ./firewalld.log"
at_fn_check_prepare_trace "gh290.at:33"
( $at_check_trace; grep "ERROR:.*Missing attribute protocol for port" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"ignore" != x"ignore"; then
            $as_echo "gh290.at:34" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:34"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_108
#AT_START_109
at_fn_group_banner 109 'icmp_block_in_forward_chain.at:1' \
  "ICMP block not present FORWARD chain" "           " 5
at_xfail=no
(
  $as_echo "109. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"








    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-icmp-block=host-prohibited "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-icmp-block=host-prohibited
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny | sed -e 's/icmp code 10/icmp code host-prohibited/'; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_block_in_forward_chain.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny | sed -e 's/icmp code 10/icmp code host-prohibited/'; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_deny {
icmp destination-unreachable icmp code host-prohibited reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_deny | sed -e 's/icmp code 10/icmp code host-prohibited/'; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_block_in_forward_chain.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_deny | sed -e 's/icmp code 10/icmp code host-prohibited/'; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_public_deny {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }
















        if test x"" != x"ignore"; then
            $as_echo "icmp_block_in_forward_chain.at:26" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:26"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_109
#AT_START_110
at_fn_group_banner 110 'pr323.at:1' \
  "GRE proto helper" "                               " 5
at_xfail=no
(
  $as_echo "110. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/pr323.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/pr323.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/pr323.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/pr323.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "pr323.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr323.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/pr323.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/pr323.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/pr323.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/pr323.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "pr323.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr323.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "pr323.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:1"






    $as_echo "pr323.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} modinfo nf_conntrack_proto_gre ) \
  && at_fn_check_skip 77 "$at_srcdir/pr323.at:4"





    { set +x
$as_echo "$at_srcdir/pr323.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/pr323.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/pr323.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/pr323.at:10: lsmod | grep nf_conntrack_proto_gre"
at_fn_check_prepare_notrace 'a shell pipeline' "pr323.at:10"
( $at_check_trace; lsmod | grep nf_conntrack_proto_gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"" != x"ignore"; then
            $as_echo "pr323.at:12" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_110
#AT_START_111
at_fn_group_banner 111 'rhbz1506742.at:1' \
  "ipset with timeout" "                             " 5
at_xfail=no
(
  $as_echo "111. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"









    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \\; } "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft flush set inet firewalld_check_ipset foobar >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"
                $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout { type ipv4_addr \; timeout 600s \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"
                $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_size { type ipv4_addr \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"
        $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout_size { type ipv4_addr \; timeout 600s \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"

                $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_interval_concat { type ipv4_addr . inet_service \; flags interval \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"
                $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -j '{"nftables": [{"add": {"element": {"family": "inet", "table": "firewalld_check_ipset", "name": "foobar_interval_concat", "elem": [{"concat": [{"prefix": {"addr": "10.10.10.0", "len": 24}}, {"range": ["1234", "2000"]}]}]}}}]}' >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"


    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --option=maxelem=1000000 --option=family=inet --option=hashsize=4096 --option=timeout=600 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --option=maxelem=1000000 --option=family=inet --option=hashsize=4096 --option=timeout=600
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1506742.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
size 1000000
flags interval,timeout
timeout 10m
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >foobar_entries.txt <<'_ATEOF'

1.2.3.4
10.0.1.1
_ATEOF




    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d'               -e '/WARNING: NOT_ENABLED/d'" != x"ignore"; then
            $as_echo "rhbz1506742.at:31" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d'               -e '/WARNING: NOT_ENABLED/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:31"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_111
#AT_START_112
at_fn_group_banner 112 'rhbz1594657.at:1' \
  "no log untracked passthrough queries" "           " 5
at_xfail=no
(
  $as_echo "112. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"






        $as_echo "rhbz1594657.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1594657.at:3"






    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough eb -t filter -L dummy_chain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough eb -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough eb -t filter -L INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough eb -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -C dummy_chain -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -C dummy_chain -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -L dummy_chain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -L INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }






    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -C dummy_chain -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -C dummy_chain -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -L dummy_chain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -L INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi



        if test x"" != x"ignore"; then
            $as_echo "rhbz1594657.at:17" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_112
#AT_START_113
at_fn_group_banner 113 'rhbz1571957.at:1' \
  "set-log-denied w/ ICMP block inversion" "         " 5
at_xfail=no
(
  $as_echo "113. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=public --add-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=public --add-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --set-log-denied=all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --set-log-denied=all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/rhbz1571957.at:7: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:7"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --set-log-denied=broadcast "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --set-log-denied=broadcast
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "rhbz1571957.at:12" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_113
#AT_START_114
at_fn_group_banner 114 'rhbz1404076.at:1' \
  "query single port added with range" "             " 5
at_xfail=no
(
  $as_echo "114. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"










    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=8070-8080/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=8070-8080/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9050-10050/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9050-10050/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9000/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9000/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8085-8087/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8085-8087/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8080-8089/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8080-8089/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8081-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8081-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=webcache/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8091/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8085/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10000-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10000-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9999/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9999/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10011/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10011/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9095-10000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9095-10000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9090-9094/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9090-9094/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=9099-10001/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=9099-10001/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10005-10020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10005-10020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10021-10022/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10021-10022/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9080-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9080-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9079-10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9079-10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=9093-10025/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=9093-10025/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70: grep \"WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:70"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=9090-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=9090-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9000/tcp 9010-9020/tcp 9079-10041/tcp 10050-10060/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=9079/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=9079/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=9080-9085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=9080-9085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10035-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10035-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10005-10009/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10005-10009/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10100-10110/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10100-10110/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70: grep \"WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:70"
( $at_check_trace; grep "WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10001-10004/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10001-10004/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10016-10019/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10016-10019/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10003-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10003-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10004-10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10004-10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10009-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10009-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9086-10004/tcp 10010-10034/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=8070-8080/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=8070-8080/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9050-10050/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9050-10050/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9000/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9000/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8085-8087/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8085-8087/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8080-8089/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8080-8089/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8081-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8081-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=webcache/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8091/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8085/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10000-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10000-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9999/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9999/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10011/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10011/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9095-10000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9095-10000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9090-9094/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9090-9094/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=9099-10001/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=9099-10001/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10005-10020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10005-10020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10021-10022/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10021-10022/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9080-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9080-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9079-10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9079-10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=9093-10025/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=9093-10025/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71: grep \"WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:71"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=9090-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=9090-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9000/tcp 9010-9020/tcp 9079-10041/tcp 10050-10060/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=9079/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=9079/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=9080-9085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=9080-9085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10035-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10035-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10005-10009/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10005-10009/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10100-10110/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10100-10110/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71: grep \"WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:71"
( $at_check_trace; grep "WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10001-10004/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10001-10004/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10016-10019/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10016-10019/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10003-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10003-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10004-10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10004-10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10009-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10009-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9086-10004/tcp 10010-10034/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=8070-8080/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=8070-8080/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9050-10050/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9050-10050/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9000/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9000/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8085-8087/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8085-8087/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8080-8089/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8080-8089/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8081-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8081-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=webcache/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8091/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8085/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10000-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10000-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9999/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9999/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10011/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10011/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9095-10000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9095-10000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9090-9094/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9090-9094/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=9099-10001/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=9099-10001/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10005-10020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10005-10020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10021-10022/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10021-10022/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9080-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9080-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9079-10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9079-10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=9093-10025/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=9093-10025/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72: grep \"WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:72"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=9090-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=9090-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9000/tcp 9010-9020/tcp 9079-10041/tcp 10050-10060/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=9079/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=9079/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=9080-9085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=9080-9085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10035-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10035-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10005-10009/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10005-10009/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10100-10110/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10100-10110/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72: grep \"WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:72"
( $at_check_trace; grep "WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10001-10004/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10001-10004/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10016-10019/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10016-10019/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10003-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10003-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10004-10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10004-10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10009-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10009-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9086-10004/tcp 10010-10034/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=8070-8080/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=8070-8080/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9050-10050/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9050-10050/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9000/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9000/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085-8087/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085-8087/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8080-8089/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8080-8089/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8081-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8081-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=webcache/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8091/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10000-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10000-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9999/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9999/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10011/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10011/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9095-10000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9095-10000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9090-9094/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9090-9094/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9099-10001/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9099-10001/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10005-10020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10005-10020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10021-10022/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10021-10022/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9080-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9080-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9079-10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9079-10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9093-10025/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9093-10025/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73: grep \"WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:73"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9090-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9090-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9000/tcp 9010-9020/tcp 9079-10041/tcp 10050-10060/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9079/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9079/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9080-9085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9080-9085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10035-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10035-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10005-10009/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10005-10009/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10100-10110/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10100-10110/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73: grep \"WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:73"
( $at_check_trace; grep "WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10001-10004/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10001-10004/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10016-10019/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10016-10019/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10003-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10003-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10004-10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10004-10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10009-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10009-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9086-10004/tcp 10010-10034/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"-e '/WARNING: ALREADY_ENABLED:/d'              -e '/WARNING: NOT_ENABLED:/d'" != x"ignore"; then
            $as_echo "rhbz1404076.at:76" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/WARNING: ALREADY_ENABLED:/d'              -e '/WARNING: NOT_ENABLED:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:76"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_114
#AT_START_115
at_fn_group_banner 115 'gh366.at:1' \
  "service destination multiple IP versions" "       " 5
at_xfail=no
(
  $as_echo "115. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh366.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh366.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh366.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh366.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh366.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh366.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh366.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh366.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh366.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh366.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh366.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh366.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh366.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:1"










    { set +x
$as_echo "$at_srcdir/gh366.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-service=mdns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-service=mdns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh366.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 accept
ip6 daddr fe80::/64 udp dport 546 accept
ip daddr 224.0.0.251 udp dport 5353 accept
ip6 daddr ff02::fb udp dport 5353 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/gh366.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --remove-service=mdns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --remove-service=mdns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh366.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-rich-rule=\"rule service name=\"mdns\" accept\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-rich-rule="rule service name="mdns" accept"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh366.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 accept
ip6 daddr fe80::/64 udp dport 546 accept
ip daddr 224.0.0.251 udp dport 5353 accept
ip6 daddr ff02::fb udp dport 5353 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/gh366.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-rich-rule='rule family=\"ipv4\" destination address=\"10.10.10.0/24\" service name=\"mdns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-rich-rule='rule family="ipv4" destination address="10.10.10.0/24" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 122 $at_status "$at_srcdir/gh366.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"-e '/ERROR: INVALID_RULE: Destination conflict with service/d'" != x"ignore"; then
            $as_echo "gh366.at:36" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_RULE: Destination conflict with service/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:36"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_115
#AT_START_116
at_fn_group_banner 116 'rhbz1601610.at:1' \
  "ipset duplicate entries" "                        " 5
at_xfail=no
(
  $as_echo "116. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \\; } "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "rhbz1601610.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft flush set inet firewalld_check_ipset foobar >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:4"
                $as_echo "rhbz1601610.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout { type ipv4_addr \; timeout 600s \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:4"
                $as_echo "rhbz1601610.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_size { type ipv4_addr \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:4"
        $as_echo "rhbz1601610.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout_size { type ipv4_addr \; timeout 600s \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:4"

                $as_echo "rhbz1601610.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_interval_concat { type ipv4_addr . inet_service \; flags interval \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:4"
                $as_echo "rhbz1601610.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -j '{"nftables": [{"add": {"element": {"family": "inet", "table": "firewalld_check_ipset", "name": "foobar_interval_concat", "elem": [{"concat": [{"prefix": {"addr": "10.10.10.0", "len": 24}}, {"range": ["1234", "2000"]}]}]}}}]}' >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:4"


    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --new-ipset=foobar --permanent --type=hash:net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --new-ipset=foobar --permanent --type=hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.2.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.2.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.1.2.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.1.2.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "Warning: ALREADY_ENABLED: '10.1.0.0/22' already is in 'foobar'
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.2.0.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.2.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.1.0.0/22
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.1.0.0/22, 10.2.0.0/22 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entry=10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1601610.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.2.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.2.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1601610.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.2.0.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.2.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.2.0.0/22 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset=foobar --add-entry=10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset=foobar --add-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.1.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset=foobar --remove-entry=10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset=foobar --remove-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entry=10.3.0.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entry=10.3.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:69:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:69"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.2.0.0/22, 10.3.0.0/22 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }










{ set +x
$as_echo "$at_srcdir/rhbz1601610.at:89: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:89"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.2.0.0/22, 10.3.0.0/22 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"-e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d'              -e '/WARNING: ALREADY_ENABLED:/d'" != x"ignore"; then
            $as_echo "rhbz1601610.at:108" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d'              -e '/WARNING: ALREADY_ENABLED:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:108"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_116
#AT_START_117
at_fn_group_banner 117 'gh303.at:1' \
  "unicode in XML" "                                 " 5
at_xfail=no
(
  $as_echo "117. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh303.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh303.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh303.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh303.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh303.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh303.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh303.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh303.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh303.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh303.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh303.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:1"





{ set +x
$as_echo "$at_srcdir/gh303.at:4: mkdir -p ./services"
at_fn_check_prepare_trace "gh303.at:4"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh303.at:5: cat <<HERE > ./services/unicode-service-test.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>unicode-service-test</short>
  <description>A string with unicode characters; Ё ώ € ⇶ ▜ ◯ ★ ☠ ☯ ☺ ♻ </description>
  <port protocol=\"tcp\" port=\"12345\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "gh303.at:5"
( $at_check_trace; cat <<HERE > ./services/unicode-service-test.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>unicode-service-test</short>
  <description>A string with unicode characters; Ё ώ € ⇶ ▜ ◯ ★ ☠ ☯ ☺ ♻ </description>
  <port protocol="tcp" port="12345"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }


LC_ALL="C"
export LC_ALL


    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh303.at:17" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:17"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh303.at:17" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:17"






    { set +x
$as_echo "$at_srcdir/gh303.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-service=unicode-service-test "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-service=unicode-service-test
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh303.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh303.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "gh303.at:22" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:22"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_117
#AT_START_118
at_fn_group_banner 118 'gh335.at:1' \
  "forward-port toaddr enables IP forwarding" "      " 5
at_xfail=no
(
  $as_echo "118. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh335.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh335.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh335.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh335.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh335.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh335.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh335.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh335.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh335.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh335.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh335.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh335.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:1"






    { set +x
$as_echo "$at_srcdir/gh335.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi




    { set +x
$as_echo "$at_srcdir/gh335.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi




    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321:toaddr=\"1234:5678::4321\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321:toaddr="1234:5678::4321"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh335.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi




    { set +x
$as_echo "$at_srcdir/gh335.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\" to-addr=\"10.10.10.10\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port="12345" protocol="tcp" to-port="54321" to-addr="10.10.10.10"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi




    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\" to-addr=\"1234:5678::4321\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port="12345" protocol="tcp" to-port="54321" to-addr="1234:5678::4321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh335.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/gh335.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port="12345" protocol="tcp" to-port="54321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh335.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port="12345" protocol="tcp" to-port="54321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            $as_echo "gh335.at:68" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:68"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_118
#AT_START_119
at_fn_group_banner 119 'gh482.at:1' \
  "remove forward-port after reload" "               " 5
at_xfail=no
(
  $as_echo "119. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh482.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh482.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh482.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh482.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh482.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh482.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh482.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh482.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh482.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh482.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh482.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh482.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh482.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:1"








    { set +x
$as_echo "$at_srcdir/gh482.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q             --add-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q             --add-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q             --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q             --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q             --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q             --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q             --remove-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q             --remove-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "gh482.at:17" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_119
#AT_START_120
at_fn_group_banner 120 'gh478.at:1' \
  "rich rule marks every packet" "                   " 5
at_xfail=no
(
  $as_echo "120. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh478.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh478.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh478.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh478.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh478.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh478.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh478.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh478.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh478.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh478.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh478.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh478.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh478.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:1"








    { set +x
$as_echo "$at_srcdir/gh478.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule port port=1234 protocol=tcp mark set=10' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule port port=1234 protocol=tcp mark set=10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh478.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule protocol value=icmp mark set=11' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule protocol value=icmp mark set=11'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh478.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule source-port port=4321 protocol=tcp mark set=12' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule source-port port=4321 protocol=tcp mark set=12'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh478.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh478.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_public_allow {
tcp dport 1234 mark set 0x0000000a
meta l4proto icmp mark set 0x0000000b
tcp sport 4321 mark set 0x0000000c
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }















        if test x"" != x"ignore"; then
            $as_echo "gh478.at:28" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:28"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_120
#AT_START_121
at_fn_group_banner 121 'gh453.at:1' \
  "nftables helper objects" "                        " 5
at_xfail=no
(
  $as_echo "121. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh453.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh453.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh453.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh453.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh453.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh453.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh453.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh453.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh453.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh453.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh453.at:1"








    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_ct_helper "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_ct_helper
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "gh453.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add ct helper inet firewalld helper-ftp-tcp { type \"ftp\" protocol tcp \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh453.at:1"

    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_ct_helper "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_ct_helper
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --set-automatic-helpers=no "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --set-automatic-helpers=no
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft list ruleset | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |grep -A3 \"ct helper helper-ftp-tcp\" "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list ruleset | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |grep -A3 "ct helper helper-ftp-tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ct helper helper-ftp-tcp {
type \"ftp\" protocol tcp
l3proto inet
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 accept
ip6 daddr fe80::/64 udp dport 546 accept
tcp dport 21 ct helper set \"helper-ftp-tcp\"
tcp dport 21 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=sip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft list ruleset | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |grep -A3 \"ct helper helper-sip-tcp\" "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list ruleset | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |grep -A3 "ct helper helper-sip-tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ct helper helper-sip-tcp {
type \"sip\" protocol tcp
l3proto inet
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft list ruleset | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |grep -A3 \"ct helper helper-sip-udp\" "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list ruleset | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |grep -A3 "ct helper helper-sip-udp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ct helper helper-sip-udp {
type \"sip\" protocol udp
l3proto inet
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 accept
ip6 daddr fe80::/64 udp dport 546 accept
tcp dport 21 ct helper set \"helper-ftp-tcp\"
tcp dport 21 accept
tcp dport 5060 ct helper set \"helper-sip-tcp\"
udp dport 5060 ct helper set \"helper-sip-udp\"
tcp dport 5060 accept
udp dport 5060 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"" != x"ignore"; then
            $as_echo "gh453.at:1" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh453.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_121
#AT_START_122
at_fn_group_banner 122 'gh258.at:1' \
  "zone dispatch layout" "                           " 5
at_xfail=no
(
  $as_echo "122. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh258.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh258.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh258.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh258.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh258.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh258.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh258.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh258.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh258.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh258.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh258.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh258.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh258.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:1"








    { set +x
$as_echo "$at_srcdir/gh258.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-source=\"1.2.3.0/24\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-source="1.2.3.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh258.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=\"dead:beef::/54\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source="dead:beef::/54"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh258.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-interface=dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh258.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=dummy1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh258.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh258.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
ct state invalid drop
jump filter_INPUT_POLICIES
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
ip6 saddr dead:beef::/54 jump filter_IN_policy_allow-host-ipv6
ip6 saddr dead:beef::/54 jump filter_IN_public
ip6 saddr dead:beef::/54 reject with icmpx admin-prohibited
ip saddr 1.2.3.0/24 jump filter_IN_policy_allow-host-ipv6
ip saddr 1.2.3.0/24 jump filter_IN_trusted
ip saddr 1.2.3.0/24 accept
iifname \"dummy1\" jump filter_IN_policy_allow-host-ipv6
iifname \"dummy1\" jump filter_IN_public
iifname \"dummy1\" reject with icmpx admin-prohibited
iifname \"dummy0\" jump filter_IN_policy_allow-host-ipv6
iifname \"dummy0\" jump filter_IN_trusted
iifname \"dummy0\" accept
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
ct state invalid drop
ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } reject with icmpv6 addr-unreachable
jump filter_FORWARD_POLICIES
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
ip6 saddr dead:beef::/54 ip6 daddr dead:beef::/54 jump filter_FWD_public
ip6 saddr dead:beef::/54 ip6 daddr dead:beef::/54 reject with icmpx admin-prohibited
oifname \"dummy1\" ip6 saddr dead:beef::/54 jump filter_FWD_public
oifname \"dummy1\" ip6 saddr dead:beef::/54 reject with icmpx admin-prohibited
oifname \"dummy0\" ip6 saddr dead:beef::/54 jump filter_FWD_public
oifname \"dummy0\" ip6 saddr dead:beef::/54 reject with icmpx admin-prohibited
ip6 saddr dead:beef::/54 jump filter_FWD_public
ip6 saddr dead:beef::/54 reject with icmpx admin-prohibited
ip saddr 1.2.3.0/24 ip daddr 1.2.3.0/24 jump filter_FWD_trusted
ip saddr 1.2.3.0/24 ip daddr 1.2.3.0/24 accept
oifname \"dummy1\" ip saddr 1.2.3.0/24 jump filter_FWD_trusted
oifname \"dummy1\" ip saddr 1.2.3.0/24 accept
oifname \"dummy0\" ip saddr 1.2.3.0/24 jump filter_FWD_trusted
oifname \"dummy0\" ip saddr 1.2.3.0/24 accept
ip saddr 1.2.3.0/24 jump filter_FWD_trusted
ip saddr 1.2.3.0/24 accept
iifname \"dummy1\" ip6 daddr dead:beef::/54 jump filter_FWD_public
iifname \"dummy1\" ip6 daddr dead:beef::/54 reject with icmpx admin-prohibited
iifname \"dummy1\" ip daddr 1.2.3.0/24 jump filter_FWD_public
iifname \"dummy1\" ip daddr 1.2.3.0/24 reject with icmpx admin-prohibited
iifname \"dummy1\" oifname \"dummy1\" jump filter_FWD_public
iifname \"dummy1\" oifname \"dummy1\" reject with icmpx admin-prohibited
iifname \"dummy1\" oifname \"dummy0\" jump filter_FWD_public
iifname \"dummy1\" oifname \"dummy0\" reject with icmpx admin-prohibited
iifname \"dummy1\" jump filter_FWD_public
iifname \"dummy1\" reject with icmpx admin-prohibited
iifname \"dummy0\" ip6 daddr dead:beef::/54 jump filter_FWD_trusted
iifname \"dummy0\" ip6 daddr dead:beef::/54 accept
iifname \"dummy0\" ip daddr 1.2.3.0/24 jump filter_FWD_trusted
iifname \"dummy0\" ip daddr 1.2.3.0/24 accept
iifname \"dummy0\" oifname \"dummy1\" jump filter_FWD_trusted
iifname \"dummy0\" oifname \"dummy1\" accept
iifname \"dummy0\" oifname \"dummy0\" jump filter_FWD_trusted
iifname \"dummy0\" oifname \"dummy0\" accept
iifname \"dummy0\" jump filter_FWD_trusted
iifname \"dummy0\" accept
ip6 daddr dead:beef::/54 jump filter_FWD_public
ip6 daddr dead:beef::/54 reject with icmpx admin-prohibited
ip daddr 1.2.3.0/24 jump filter_FWD_public
ip daddr 1.2.3.0/24 reject with icmpx admin-prohibited
oifname \"dummy1\" jump filter_FWD_public
oifname \"dummy1\" reject with icmpx admin-prohibited
oifname \"dummy0\" jump filter_FWD_public
oifname \"dummy0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :






    { set +x
$as_echo "$at_srcdir/gh258.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_PREROUTING {
icmpv6 type { nd-router-advert, nd-neighbor-solicit } accept
meta nfproto ipv6 fib saddr . mark . iif oif missing drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    else
        :






    { set +x
$as_echo "$at_srcdir/gh258.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_PREROUTING {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    fi






    { set +x
$as_echo "$at_srcdir/gh258.at:129:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:129"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING {
jump mangle_PREROUTING_POLICIES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:129"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:136:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:136"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES {
ip6 saddr dead:beef::/54 jump mangle_PRE_policy_allow-host-ipv6
ip6 saddr dead:beef::/54 ip6 daddr dead:beef::/54 jump mangle_PRE_public
ip6 saddr dead:beef::/54 ip6 daddr dead:beef::/54 return
ip6 saddr dead:beef::/54 jump mangle_PRE_public
ip6 saddr dead:beef::/54 return
ip saddr 1.2.3.0/24 jump mangle_PRE_policy_allow-host-ipv6
ip saddr 1.2.3.0/24 ip daddr 1.2.3.0/24 jump mangle_PRE_trusted
ip saddr 1.2.3.0/24 ip daddr 1.2.3.0/24 return
ip saddr 1.2.3.0/24 jump mangle_PRE_trusted
ip saddr 1.2.3.0/24 return
iifname \"dummy1\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"dummy1\" ip6 daddr dead:beef::/54 jump mangle_PRE_public
iifname \"dummy1\" ip6 daddr dead:beef::/54 return
iifname \"dummy1\" ip daddr 1.2.3.0/24 jump mangle_PRE_public
iifname \"dummy1\" ip daddr 1.2.3.0/24 return
iifname \"dummy1\" jump mangle_PRE_public
iifname \"dummy1\" return
iifname \"dummy0\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"dummy0\" ip6 daddr dead:beef::/54 jump mangle_PRE_trusted
iifname \"dummy0\" ip6 daddr dead:beef::/54 return
iifname \"dummy0\" ip daddr 1.2.3.0/24 jump mangle_PRE_trusted
iifname \"dummy0\" ip daddr 1.2.3.0/24 return
iifname \"dummy0\" jump mangle_PRE_trusted
iifname \"dummy0\" return
jump mangle_PRE_policy_allow-host-ipv6
ip6 daddr dead:beef::/54 jump mangle_PRE_public
ip6 daddr dead:beef::/54 return
ip daddr 1.2.3.0/24 jump mangle_PRE_public
ip daddr 1.2.3.0/24 return
jump mangle_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:136"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING {
jump nat_PREROUTING_POLICIES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:173"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:180:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:180"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
ip6 saddr dead:beef::/54 jump nat_PRE_policy_allow-host-ipv6
ip6 saddr dead:beef::/54 ip6 daddr dead:beef::/54 jump nat_PRE_public
ip6 saddr dead:beef::/54 ip6 daddr dead:beef::/54 return
ip6 saddr dead:beef::/54 jump nat_PRE_public
ip6 saddr dead:beef::/54 return
ip saddr 1.2.3.0/24 jump nat_PRE_policy_allow-host-ipv6
ip saddr 1.2.3.0/24 ip daddr 1.2.3.0/24 jump nat_PRE_trusted
ip saddr 1.2.3.0/24 ip daddr 1.2.3.0/24 return
ip saddr 1.2.3.0/24 jump nat_PRE_trusted
ip saddr 1.2.3.0/24 return
iifname \"dummy1\" jump nat_PRE_policy_allow-host-ipv6
iifname \"dummy1\" ip6 daddr dead:beef::/54 jump nat_PRE_public
iifname \"dummy1\" ip6 daddr dead:beef::/54 return
iifname \"dummy1\" ip daddr 1.2.3.0/24 jump nat_PRE_public
iifname \"dummy1\" ip daddr 1.2.3.0/24 return
iifname \"dummy1\" jump nat_PRE_public
iifname \"dummy1\" return
iifname \"dummy0\" jump nat_PRE_policy_allow-host-ipv6
iifname \"dummy0\" ip6 daddr dead:beef::/54 jump nat_PRE_trusted
iifname \"dummy0\" ip6 daddr dead:beef::/54 return
iifname \"dummy0\" ip daddr 1.2.3.0/24 jump nat_PRE_trusted
iifname \"dummy0\" ip daddr 1.2.3.0/24 return
iifname \"dummy0\" jump nat_PRE_trusted
iifname \"dummy0\" return
jump nat_PRE_policy_allow-host-ipv6
ip6 daddr dead:beef::/54 jump nat_PRE_public
ip6 daddr dead:beef::/54 return
ip daddr 1.2.3.0/24 jump nat_PRE_public
ip daddr 1.2.3.0/24 return
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:180"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING {
jump nat_POSTROUTING_POLICIES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:224:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:224"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES {
ip6 saddr dead:beef::/54 ip6 daddr dead:beef::/54 jump nat_POST_public
ip6 saddr dead:beef::/54 ip6 daddr dead:beef::/54 return
iifname \"dummy1\" ip6 daddr dead:beef::/54 jump nat_POST_public
iifname \"dummy1\" ip6 daddr dead:beef::/54 return
iifname \"dummy0\" ip6 daddr dead:beef::/54 jump nat_POST_public
iifname \"dummy0\" ip6 daddr dead:beef::/54 return
ip6 daddr dead:beef::/54 jump nat_POST_public
ip6 daddr dead:beef::/54 return
ip saddr 1.2.3.0/24 ip daddr 1.2.3.0/24 jump nat_POST_trusted
ip saddr 1.2.3.0/24 ip daddr 1.2.3.0/24 return
iifname \"dummy1\" ip daddr 1.2.3.0/24 jump nat_POST_trusted
iifname \"dummy1\" ip daddr 1.2.3.0/24 return
iifname \"dummy0\" ip daddr 1.2.3.0/24 jump nat_POST_trusted
iifname \"dummy0\" ip daddr 1.2.3.0/24 return
ip daddr 1.2.3.0/24 jump nat_POST_trusted
ip daddr 1.2.3.0/24 return
oifname \"dummy1\" ip6 saddr dead:beef::/54 jump nat_POST_public
oifname \"dummy1\" ip6 saddr dead:beef::/54 return
oifname \"dummy1\" ip saddr 1.2.3.0/24 jump nat_POST_public
oifname \"dummy1\" ip saddr 1.2.3.0/24 return
iifname \"dummy1\" oifname \"dummy1\" jump nat_POST_public
iifname \"dummy1\" oifname \"dummy1\" return
iifname \"dummy0\" oifname \"dummy1\" jump nat_POST_public
iifname \"dummy0\" oifname \"dummy1\" return
oifname \"dummy1\" jump nat_POST_public
oifname \"dummy1\" return
oifname \"dummy0\" ip6 saddr dead:beef::/54 jump nat_POST_trusted
oifname \"dummy0\" ip6 saddr dead:beef::/54 return
oifname \"dummy0\" ip saddr 1.2.3.0/24 jump nat_POST_trusted
oifname \"dummy0\" ip saddr 1.2.3.0/24 return
iifname \"dummy1\" oifname \"dummy0\" jump nat_POST_trusted
iifname \"dummy1\" oifname \"dummy0\" return
iifname \"dummy0\" oifname \"dummy0\" jump nat_POST_trusted
iifname \"dummy0\" oifname \"dummy0\" return
oifname \"dummy0\" jump nat_POST_trusted
oifname \"dummy0\" return
ip6 saddr dead:beef::/54 jump nat_POST_public
ip6 saddr dead:beef::/54 return
ip saddr 1.2.3.0/24 jump nat_POST_public
ip saddr 1.2.3.0/24 return
iifname \"dummy1\" jump nat_POST_public
iifname \"dummy1\" return
iifname \"dummy0\" jump nat_POST_public
iifname \"dummy0\" return
jump nat_POST_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:224"
$at_failed && at_fn_log_failure
$at_traceon; }



















































































        if test x"" != x"ignore"; then
            $as_echo "gh258.at:595" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:595"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_122
#AT_START_123
at_fn_group_banner 123 'rhbz1715977.at:1' \
  "rich rule src/dst with service destination" "     " 5
at_xfail=no
(
  $as_echo "123. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"ssh\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1715977.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_internal_allow {
tcp dport 22 accept
ip daddr 224.0.0.251 udp dport 5353 accept
ip6 daddr ff02::fb udp dport 5353 accept
udp dport 137 ct helper set \"helper-netbios-ns-udp\"
udp dport 137 accept
udp dport 138 accept
ip6 daddr fe80::/64 udp dport 546 accept
ip daddr 192.168.122.235 tcp dport 22 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.111.222/32\" source address=\"10.10.10.0/24\" service name=\"ssh\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.111.222/32" source address="10.10.10.0/24" service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1715977.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_internal_allow {
tcp dport 22 accept
ip daddr 224.0.0.251 udp dport 5353 accept
ip6 daddr ff02::fb udp dport 5353 accept
udp dport 137 ct helper set \"helper-netbios-ns-udp\"
udp dport 137 accept
udp dport 138 accept
ip6 daddr fe80::/64 udp dport 546 accept
ip daddr 192.168.122.235 tcp dport 22 accept
ip daddr 192.168.111.222 ip saddr 10.10.10.0/24 tcp dport 22 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 service name=\"ssdp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 service name="ssdp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:69:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1715977.at:69"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_internal_allow {
tcp dport 22 accept
ip daddr 224.0.0.251 udp dport 5353 accept
ip6 daddr ff02::fb udp dport 5353 accept
udp dport 137 ct helper set \"helper-netbios-ns-udp\"
udp dport 137 accept
udp dport 138 accept
ip6 daddr fe80::/64 udp dport 546 accept
ip daddr 192.168.122.235 tcp dport 22 accept
ip daddr 192.168.111.222 ip saddr 10.10.10.0/24 tcp dport 22 accept
ip daddr 239.255.255.250 udp dport 1900 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"mdns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rhbz1715977.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"mdns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rhbz1715977.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1715977.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"-e '/ERROR: INVALID_RULE: Destination conflict with service/d'" != x"ignore"; then
            $as_echo "rhbz1715977.at:106" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_RULE: Destination conflict with service/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:106"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_123
#AT_START_124
at_fn_group_banner 124 'rhbz1723610.at:1' \
  "direct remove-rules per family" "                 " 5
at_xfail=no
(
  $as_echo "124. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1723610.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1723610.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1723610.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:1"






        $as_echo "rhbz1723610.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1723610.at:3"






    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rules ipv6 filter INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rules ipv6 filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rules ipv4 filter INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rules ipv4 filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --remove-rules ipv4 filter OUTPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --remove-rules ipv4 filter OUTPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1723610.at:32" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:32"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_124
#AT_START_125
at_fn_group_banner 125 'rhbz1734765.at:1' \
  "zone sources ordered by name" "                   " 5
at_xfail=no
(
  $as_echo "125. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1734765.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1734765.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1734765.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_00 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_00
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_05 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_05
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_02 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_02
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_03 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_03
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_01 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_01
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_04 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_04
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_010 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_010
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_011 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_011
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_012 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_012
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset 'ipsetv4' --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset 'ipsetv4' --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset 'ipsetv6' --type hash:ip --family=inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset 'ipsetv6' --type hash:ip --family=inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset ipsetv4 --add-entry '192.0.2.12' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset ipsetv4 --add-entry '192.0.2.12'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset ipsetv6 --add-entry '::2' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset ipsetv6 --add-entry '::2'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_011 --add-source ipset:ipsetv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_011 --add-source ipset:ipsetv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_01 --add-source=\"10.1.1.0/24\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_01 --add-source="10.1.1.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_02 --add-source=\"10.1.0.0/16\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_02 --add-source="10.1.0.0/16"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_04 --add-source=\"10.2.0.0/16\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_04 --add-source="10.2.0.0/16"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_00 --add-source=\"10.1.1.1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_00 --add-source="10.1.1.1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_03 --add-source=\"10.2.2.0/24\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_03 --add-source="10.2.2.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_05 --add-source=\"10.0.0.0/8\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_05 --add-source="10.0.0.0/8"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_01 --add-source=\"1234:5678::1:1:0/112\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_01 --add-source="1234:5678::1:1:0/112"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_02 --add-source=\"1234:5678::1:0:0/96\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_02 --add-source="1234:5678::1:0:0/96"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_04 --add-source=\"1234:5678::2:0:0/96\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_04 --add-source="1234:5678::2:0:0/96"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_03 --add-source=\"1234:5678::2:2:0/112\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_03 --add-source="1234:5678::2:2:0/112"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_05 --add-source=\"1234:5678::0:0:0/80\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_05 --add-source="1234:5678::0:0:0/80"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_00 --add-source=\"1234:5678::1:1:1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_00 --add-source="1234:5678::1:1:1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=trusted --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=trusted --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld ipsetv4; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld ipsetv4; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set ipsetv4 {
type ipv4_addr
flags interval
elements = { 192.0.2.12 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld ipsetv6; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld ipsetv6; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set ipsetv6 {
type ipv6_addr
flags interval
elements = { ::2 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-source=\"10.10.10.10\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-source="10.10.10.10"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-source=\"20.20.20.20\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-source="20.20.20.20"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-source=\"1234:5678::10:10:10\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-source="1234:5678::10:10:10"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-source=\"1234:5678::20:20:20\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-source="1234:5678::20:20:20"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=foobar_012 --add-source ipset:ipsetv6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=foobar_012 --add-source ipset:ipsetv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:69:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-interface=foobar2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:69"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-interface=foobar2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
ip saddr 10.1.1.1 jump filter_IN_policy_allow-host-ipv6
ip saddr 10.1.1.1 jump filter_IN_foobar_00
ip saddr 10.1.1.1 reject with icmpx admin-prohibited
ip6 saddr 1234:5678::1:1:1 jump filter_IN_policy_allow-host-ipv6
ip6 saddr 1234:5678::1:1:1 jump filter_IN_foobar_00
ip6 saddr 1234:5678::1:1:1 reject with icmpx admin-prohibited
ip saddr 10.1.1.0/24 jump filter_IN_policy_allow-host-ipv6
ip saddr 10.1.1.0/24 jump filter_IN_foobar_01
ip saddr 10.1.1.0/24 reject with icmpx admin-prohibited
ip6 saddr 1234:5678::1:1:0/112 jump filter_IN_policy_allow-host-ipv6
ip6 saddr 1234:5678::1:1:0/112 jump filter_IN_foobar_01
ip6 saddr 1234:5678::1:1:0/112 reject with icmpx admin-prohibited
ip saddr 10.10.10.10 jump filter_IN_policy_allow-host-ipv6
ip saddr 10.10.10.10 jump filter_IN_foobar_010
ip saddr 10.10.10.10 reject with icmpx admin-prohibited
ip6 saddr 1234:5678::10:10:10 jump filter_IN_policy_allow-host-ipv6
ip6 saddr 1234:5678::10:10:10 jump filter_IN_foobar_010
ip6 saddr 1234:5678::10:10:10 reject with icmpx admin-prohibited
ip saddr @ipsetv4 jump filter_IN_policy_allow-host-ipv6
ip saddr @ipsetv4 jump filter_IN_foobar_011
ip saddr @ipsetv4 reject with icmpx admin-prohibited
ip6 saddr @ipsetv6 jump filter_IN_policy_allow-host-ipv6
ip6 saddr @ipsetv6 jump filter_IN_foobar_012
ip6 saddr @ipsetv6 reject with icmpx admin-prohibited
ip saddr 10.1.0.0/16 jump filter_IN_policy_allow-host-ipv6
ip saddr 10.1.0.0/16 jump filter_IN_foobar_02
ip saddr 10.1.0.0/16 reject with icmpx admin-prohibited
ip6 saddr 1234:5678::1:0:0/96 jump filter_IN_policy_allow-host-ipv6
ip6 saddr 1234:5678::1:0:0/96 jump filter_IN_foobar_02
ip6 saddr 1234:5678::1:0:0/96 reject with icmpx admin-prohibited
ip saddr 10.2.2.0/24 jump filter_IN_policy_allow-host-ipv6
ip saddr 10.2.2.0/24 jump filter_IN_foobar_03
ip saddr 10.2.2.0/24 reject with icmpx admin-prohibited
ip6 saddr 1234:5678::2:2:0/112 jump filter_IN_policy_allow-host-ipv6
ip6 saddr 1234:5678::2:2:0/112 jump filter_IN_foobar_03
ip6 saddr 1234:5678::2:2:0/112 reject with icmpx admin-prohibited
ip saddr 10.2.0.0/16 jump filter_IN_policy_allow-host-ipv6
ip saddr 10.2.0.0/16 jump filter_IN_foobar_04
ip saddr 10.2.0.0/16 reject with icmpx admin-prohibited
ip6 saddr 1234:5678::2:0:0/96 jump filter_IN_policy_allow-host-ipv6
ip6 saddr 1234:5678::2:0:0/96 jump filter_IN_foobar_04
ip6 saddr 1234:5678::2:0:0/96 reject with icmpx admin-prohibited
ip saddr 10.0.0.0/8 jump filter_IN_policy_allow-host-ipv6
ip saddr 10.0.0.0/8 jump filter_IN_foobar_05
ip saddr 10.0.0.0/8 reject with icmpx admin-prohibited
ip6 saddr 1234:5678::/80 jump filter_IN_policy_allow-host-ipv6
ip6 saddr 1234:5678::/80 jump filter_IN_foobar_05
ip6 saddr 1234:5678::/80 reject with icmpx admin-prohibited
ip6 saddr 1234:5678::20:20:20 jump filter_IN_policy_allow-host-ipv6
ip6 saddr 1234:5678::20:20:20 jump filter_IN_public
ip6 saddr 1234:5678::20:20:20 reject with icmpx admin-prohibited
ip saddr 20.20.20.20 jump filter_IN_policy_allow-host-ipv6
ip saddr 20.20.20.20 jump filter_IN_public
ip saddr 20.20.20.20 reject with icmpx admin-prohibited
iifname \"foobar2\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar2\" jump filter_IN_foobar_010
iifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar0\" jump filter_IN_internal
iifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar1\" jump filter_IN_trusted
iifname \"foobar1\" accept
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES {
ip saddr 10.1.1.1 ip daddr 10.1.1.1 jump nat_POST_foobar_00
ip saddr 10.1.1.1 ip daddr 10.1.1.1 return
ip saddr 10.1.1.0/24 ip daddr 10.1.1.1 jump nat_POST_foobar_00
ip saddr 10.1.1.0/24 ip daddr 10.1.1.1 return
ip saddr 10.10.10.10 ip daddr 10.1.1.1 jump nat_POST_foobar_00
ip saddr 10.10.10.10 ip daddr 10.1.1.1 return
ip saddr @ipsetv4 ip daddr 10.1.1.1 jump nat_POST_foobar_00
ip saddr @ipsetv4 ip daddr 10.1.1.1 return
ip saddr 10.1.0.0/16 ip daddr 10.1.1.1 jump nat_POST_foobar_00
ip saddr 10.1.0.0/16 ip daddr 10.1.1.1 return
ip saddr 10.2.2.0/24 ip daddr 10.1.1.1 jump nat_POST_foobar_00
ip saddr 10.2.2.0/24 ip daddr 10.1.1.1 return
ip saddr 10.2.0.0/16 ip daddr 10.1.1.1 jump nat_POST_foobar_00
ip saddr 10.2.0.0/16 ip daddr 10.1.1.1 return
ip saddr 10.0.0.0/8 ip daddr 10.1.1.1 jump nat_POST_foobar_00
ip saddr 10.0.0.0/8 ip daddr 10.1.1.1 return
ip saddr 20.20.20.20 ip daddr 10.1.1.1 jump nat_POST_foobar_00
ip saddr 20.20.20.20 ip daddr 10.1.1.1 return
iifname \"foobar2\" ip daddr 10.1.1.1 jump nat_POST_foobar_00
iifname \"foobar2\" ip daddr 10.1.1.1 return
iifname \"foobar0\" ip daddr 10.1.1.1 jump nat_POST_foobar_00
iifname \"foobar0\" ip daddr 10.1.1.1 return
iifname \"foobar1\" ip daddr 10.1.1.1 jump nat_POST_foobar_00
iifname \"foobar1\" ip daddr 10.1.1.1 return
ip daddr 10.1.1.1 jump nat_POST_foobar_00
ip daddr 10.1.1.1 return
ip6 saddr 1234:5678::1:1:1 ip6 daddr 1234:5678::1:1:1 jump nat_POST_foobar_00
ip6 saddr 1234:5678::1:1:1 ip6 daddr 1234:5678::1:1:1 return
ip6 saddr 1234:5678::1:1:0/112 ip6 daddr 1234:5678::1:1:1 jump nat_POST_foobar_00
ip6 saddr 1234:5678::1:1:0/112 ip6 daddr 1234:5678::1:1:1 return
ip6 saddr 1234:5678::10:10:10 ip6 daddr 1234:5678::1:1:1 jump nat_POST_foobar_00
ip6 saddr 1234:5678::10:10:10 ip6 daddr 1234:5678::1:1:1 return
ip6 saddr @ipsetv6 ip6 daddr 1234:5678::1:1:1 jump nat_POST_foobar_00
ip6 saddr @ipsetv6 ip6 daddr 1234:5678::1:1:1 return
ip6 saddr 1234:5678::1:0:0/96 ip6 daddr 1234:5678::1:1:1 jump nat_POST_foobar_00
ip6 saddr 1234:5678::1:0:0/96 ip6 daddr 1234:5678::1:1:1 return
ip6 saddr 1234:5678::2:2:0/112 ip6 daddr 1234:5678::1:1:1 jump nat_POST_foobar_00
ip6 saddr 1234:5678::2:2:0/112 ip6 daddr 1234:5678::1:1:1 return
ip6 saddr 1234:5678::2:0:0/96 ip6 daddr 1234:5678::1:1:1 jump nat_POST_foobar_00
ip6 saddr 1234:5678::2:0:0/96 ip6 daddr 1234:5678::1:1:1 return
ip6 saddr 1234:5678::/80 ip6 daddr 1234:5678::1:1:1 jump nat_POST_foobar_00
ip6 saddr 1234:5678::/80 ip6 daddr 1234:5678::1:1:1 return
ip6 saddr 1234:5678::20:20:20 ip6 daddr 1234:5678::1:1:1 jump nat_POST_foobar_00
ip6 saddr 1234:5678::20:20:20 ip6 daddr 1234:5678::1:1:1 return
iifname \"foobar2\" ip6 daddr 1234:5678::1:1:1 jump nat_POST_foobar_00
iifname \"foobar2\" ip6 daddr 1234:5678::1:1:1 return
iifname \"foobar0\" ip6 daddr 1234:5678::1:1:1 jump nat_POST_foobar_00
iifname \"foobar0\" ip6 daddr 1234:5678::1:1:1 return
iifname \"foobar1\" ip6 daddr 1234:5678::1:1:1 jump nat_POST_foobar_00
iifname \"foobar1\" ip6 daddr 1234:5678::1:1:1 return
ip6 daddr 1234:5678::1:1:1 jump nat_POST_foobar_00
ip6 daddr 1234:5678::1:1:1 return
ip saddr 10.1.1.1 ip daddr 10.1.1.0/24 jump nat_POST_foobar_01
ip saddr 10.1.1.1 ip daddr 10.1.1.0/24 return
ip saddr 10.1.1.0/24 ip daddr 10.1.1.0/24 jump nat_POST_foobar_01
ip saddr 10.1.1.0/24 ip daddr 10.1.1.0/24 return
ip saddr 10.10.10.10 ip daddr 10.1.1.0/24 jump nat_POST_foobar_01
ip saddr 10.10.10.10 ip daddr 10.1.1.0/24 return
ip saddr @ipsetv4 ip daddr 10.1.1.0/24 jump nat_POST_foobar_01
ip saddr @ipsetv4 ip daddr 10.1.1.0/24 return
ip saddr 10.1.0.0/16 ip daddr 10.1.1.0/24 jump nat_POST_foobar_01
ip saddr 10.1.0.0/16 ip daddr 10.1.1.0/24 return
ip saddr 10.2.2.0/24 ip daddr 10.1.1.0/24 jump nat_POST_foobar_01
ip saddr 10.2.2.0/24 ip daddr 10.1.1.0/24 return
ip saddr 10.2.0.0/16 ip daddr 10.1.1.0/24 jump nat_POST_foobar_01
ip saddr 10.2.0.0/16 ip daddr 10.1.1.0/24 return
ip saddr 10.0.0.0/8 ip daddr 10.1.1.0/24 jump nat_POST_foobar_01
ip saddr 10.0.0.0/8 ip daddr 10.1.1.0/24 return
ip saddr 20.20.20.20 ip daddr 10.1.1.0/24 jump nat_POST_foobar_01
ip saddr 20.20.20.20 ip daddr 10.1.1.0/24 return
iifname \"foobar2\" ip daddr 10.1.1.0/24 jump nat_POST_foobar_01
iifname \"foobar2\" ip daddr 10.1.1.0/24 return
iifname \"foobar0\" ip daddr 10.1.1.0/24 jump nat_POST_foobar_01
iifname \"foobar0\" ip daddr 10.1.1.0/24 return
iifname \"foobar1\" ip daddr 10.1.1.0/24 jump nat_POST_foobar_01
iifname \"foobar1\" ip daddr 10.1.1.0/24 return
ip daddr 10.1.1.0/24 jump nat_POST_foobar_01
ip daddr 10.1.1.0/24 return
ip6 saddr 1234:5678::1:1:1 ip6 daddr 1234:5678::1:1:0/112 jump nat_POST_foobar_01
ip6 saddr 1234:5678::1:1:1 ip6 daddr 1234:5678::1:1:0/112 return
ip6 saddr 1234:5678::1:1:0/112 ip6 daddr 1234:5678::1:1:0/112 jump nat_POST_foobar_01
ip6 saddr 1234:5678::1:1:0/112 ip6 daddr 1234:5678::1:1:0/112 return
ip6 saddr 1234:5678::10:10:10 ip6 daddr 1234:5678::1:1:0/112 jump nat_POST_foobar_01
ip6 saddr 1234:5678::10:10:10 ip6 daddr 1234:5678::1:1:0/112 return
ip6 saddr @ipsetv6 ip6 daddr 1234:5678::1:1:0/112 jump nat_POST_foobar_01
ip6 saddr @ipsetv6 ip6 daddr 1234:5678::1:1:0/112 return
ip6 saddr 1234:5678::1:0:0/96 ip6 daddr 1234:5678::1:1:0/112 jump nat_POST_foobar_01
ip6 saddr 1234:5678::1:0:0/96 ip6 daddr 1234:5678::1:1:0/112 return
ip6 saddr 1234:5678::2:2:0/112 ip6 daddr 1234:5678::1:1:0/112 jump nat_POST_foobar_01
ip6 saddr 1234:5678::2:2:0/112 ip6 daddr 1234:5678::1:1:0/112 return
ip6 saddr 1234:5678::2:0:0/96 ip6 daddr 1234:5678::1:1:0/112 jump nat_POST_foobar_01
ip6 saddr 1234:5678::2:0:0/96 ip6 daddr 1234:5678::1:1:0/112 return
ip6 saddr 1234:5678::/80 ip6 daddr 1234:5678::1:1:0/112 jump nat_POST_foobar_01
ip6 saddr 1234:5678::/80 ip6 daddr 1234:5678::1:1:0/112 return
ip6 saddr 1234:5678::20:20:20 ip6 daddr 1234:5678::1:1:0/112 jump nat_POST_foobar_01
ip6 saddr 1234:5678::20:20:20 ip6 daddr 1234:5678::1:1:0/112 return
iifname \"foobar2\" ip6 daddr 1234:5678::1:1:0/112 jump nat_POST_foobar_01
iifname \"foobar2\" ip6 daddr 1234:5678::1:1:0/112 return
iifname \"foobar0\" ip6 daddr 1234:5678::1:1:0/112 jump nat_POST_foobar_01
iifname \"foobar0\" ip6 daddr 1234:5678::1:1:0/112 return
iifname \"foobar1\" ip6 daddr 1234:5678::1:1:0/112 jump nat_POST_foobar_01
iifname \"foobar1\" ip6 daddr 1234:5678::1:1:0/112 return
ip6 daddr 1234:5678::1:1:0/112 jump nat_POST_foobar_01
ip6 daddr 1234:5678::1:1:0/112 return
ip saddr 10.1.1.1 ip daddr 10.10.10.10 jump nat_POST_foobar_010
ip saddr 10.1.1.1 ip daddr 10.10.10.10 return
ip saddr 10.1.1.0/24 ip daddr 10.10.10.10 jump nat_POST_foobar_010
ip saddr 10.1.1.0/24 ip daddr 10.10.10.10 return
ip saddr 10.10.10.10 ip daddr 10.10.10.10 jump nat_POST_foobar_010
ip saddr 10.10.10.10 ip daddr 10.10.10.10 return
ip saddr @ipsetv4 ip daddr 10.10.10.10 jump nat_POST_foobar_010
ip saddr @ipsetv4 ip daddr 10.10.10.10 return
ip saddr 10.1.0.0/16 ip daddr 10.10.10.10 jump nat_POST_foobar_010
ip saddr 10.1.0.0/16 ip daddr 10.10.10.10 return
ip saddr 10.2.2.0/24 ip daddr 10.10.10.10 jump nat_POST_foobar_010
ip saddr 10.2.2.0/24 ip daddr 10.10.10.10 return
ip saddr 10.2.0.0/16 ip daddr 10.10.10.10 jump nat_POST_foobar_010
ip saddr 10.2.0.0/16 ip daddr 10.10.10.10 return
ip saddr 10.0.0.0/8 ip daddr 10.10.10.10 jump nat_POST_foobar_010
ip saddr 10.0.0.0/8 ip daddr 10.10.10.10 return
ip saddr 20.20.20.20 ip daddr 10.10.10.10 jump nat_POST_foobar_010
ip saddr 20.20.20.20 ip daddr 10.10.10.10 return
iifname \"foobar2\" ip daddr 10.10.10.10 jump nat_POST_foobar_010
iifname \"foobar2\" ip daddr 10.10.10.10 return
iifname \"foobar0\" ip daddr 10.10.10.10 jump nat_POST_foobar_010
iifname \"foobar0\" ip daddr 10.10.10.10 return
iifname \"foobar1\" ip daddr 10.10.10.10 jump nat_POST_foobar_010
iifname \"foobar1\" ip daddr 10.10.10.10 return
ip daddr 10.10.10.10 jump nat_POST_foobar_010
ip daddr 10.10.10.10 return
ip6 saddr 1234:5678::1:1:1 ip6 daddr 1234:5678::10:10:10 jump nat_POST_foobar_010
ip6 saddr 1234:5678::1:1:1 ip6 daddr 1234:5678::10:10:10 return
ip6 saddr 1234:5678::1:1:0/112 ip6 daddr 1234:5678::10:10:10 jump nat_POST_foobar_010
ip6 saddr 1234:5678::1:1:0/112 ip6 daddr 1234:5678::10:10:10 return
ip6 saddr 1234:5678::10:10:10 ip6 daddr 1234:5678::10:10:10 jump nat_POST_foobar_010
ip6 saddr 1234:5678::10:10:10 ip6 daddr 1234:5678::10:10:10 return
ip6 saddr @ipsetv6 ip6 daddr 1234:5678::10:10:10 jump nat_POST_foobar_010
ip6 saddr @ipsetv6 ip6 daddr 1234:5678::10:10:10 return
ip6 saddr 1234:5678::1:0:0/96 ip6 daddr 1234:5678::10:10:10 jump nat_POST_foobar_010
ip6 saddr 1234:5678::1:0:0/96 ip6 daddr 1234:5678::10:10:10 return
ip6 saddr 1234:5678::2:2:0/112 ip6 daddr 1234:5678::10:10:10 jump nat_POST_foobar_010
ip6 saddr 1234:5678::2:2:0/112 ip6 daddr 1234:5678::10:10:10 return
ip6 saddr 1234:5678::2:0:0/96 ip6 daddr 1234:5678::10:10:10 jump nat_POST_foobar_010
ip6 saddr 1234:5678::2:0:0/96 ip6 daddr 1234:5678::10:10:10 return
ip6 saddr 1234:5678::/80 ip6 daddr 1234:5678::10:10:10 jump nat_POST_foobar_010
ip6 saddr 1234:5678::/80 ip6 daddr 1234:5678::10:10:10 return
ip6 saddr 1234:5678::20:20:20 ip6 daddr 1234:5678::10:10:10 jump nat_POST_foobar_010
ip6 saddr 1234:5678::20:20:20 ip6 daddr 1234:5678::10:10:10 return
iifname \"foobar2\" ip6 daddr 1234:5678::10:10:10 jump nat_POST_foobar_010
iifname \"foobar2\" ip6 daddr 1234:5678::10:10:10 return
iifname \"foobar0\" ip6 daddr 1234:5678::10:10:10 jump nat_POST_foobar_010
iifname \"foobar0\" ip6 daddr 1234:5678::10:10:10 return
iifname \"foobar1\" ip6 daddr 1234:5678::10:10:10 jump nat_POST_foobar_010
iifname \"foobar1\" ip6 daddr 1234:5678::10:10:10 return
ip6 daddr 1234:5678::10:10:10 jump nat_POST_foobar_010
ip6 daddr 1234:5678::10:10:10 return
ip saddr 10.1.1.1 ip daddr @ipsetv4 jump nat_POST_foobar_011
ip saddr 10.1.1.1 ip daddr @ipsetv4 return
ip saddr 10.1.1.0/24 ip daddr @ipsetv4 jump nat_POST_foobar_011
ip saddr 10.1.1.0/24 ip daddr @ipsetv4 return
ip saddr 10.10.10.10 ip daddr @ipsetv4 jump nat_POST_foobar_011
ip saddr 10.10.10.10 ip daddr @ipsetv4 return
ip saddr @ipsetv4 ip daddr @ipsetv4 jump nat_POST_foobar_011
ip saddr @ipsetv4 ip daddr @ipsetv4 return
ip saddr 10.1.0.0/16 ip daddr @ipsetv4 jump nat_POST_foobar_011
ip saddr 10.1.0.0/16 ip daddr @ipsetv4 return
ip saddr 10.2.2.0/24 ip daddr @ipsetv4 jump nat_POST_foobar_011
ip saddr 10.2.2.0/24 ip daddr @ipsetv4 return
ip saddr 10.2.0.0/16 ip daddr @ipsetv4 jump nat_POST_foobar_011
ip saddr 10.2.0.0/16 ip daddr @ipsetv4 return
ip saddr 10.0.0.0/8 ip daddr @ipsetv4 jump nat_POST_foobar_011
ip saddr 10.0.0.0/8 ip daddr @ipsetv4 return
ip saddr 20.20.20.20 ip daddr @ipsetv4 jump nat_POST_foobar_011
ip saddr 20.20.20.20 ip daddr @ipsetv4 return
iifname \"foobar2\" ip daddr @ipsetv4 jump nat_POST_foobar_011
iifname \"foobar2\" ip daddr @ipsetv4 return
iifname \"foobar0\" ip daddr @ipsetv4 jump nat_POST_foobar_011
iifname \"foobar0\" ip daddr @ipsetv4 return
iifname \"foobar1\" ip daddr @ipsetv4 jump nat_POST_foobar_011
iifname \"foobar1\" ip daddr @ipsetv4 return
ip daddr @ipsetv4 jump nat_POST_foobar_011
ip daddr @ipsetv4 return
ip6 saddr 1234:5678::1:1:1 ip6 daddr @ipsetv6 jump nat_POST_foobar_012
ip6 saddr 1234:5678::1:1:1 ip6 daddr @ipsetv6 return
ip6 saddr 1234:5678::1:1:0/112 ip6 daddr @ipsetv6 jump nat_POST_foobar_012
ip6 saddr 1234:5678::1:1:0/112 ip6 daddr @ipsetv6 return
ip6 saddr 1234:5678::10:10:10 ip6 daddr @ipsetv6 jump nat_POST_foobar_012
ip6 saddr 1234:5678::10:10:10 ip6 daddr @ipsetv6 return
ip6 saddr @ipsetv6 ip6 daddr @ipsetv6 jump nat_POST_foobar_012
ip6 saddr @ipsetv6 ip6 daddr @ipsetv6 return
ip6 saddr 1234:5678::1:0:0/96 ip6 daddr @ipsetv6 jump nat_POST_foobar_012
ip6 saddr 1234:5678::1:0:0/96 ip6 daddr @ipsetv6 return
ip6 saddr 1234:5678::2:2:0/112 ip6 daddr @ipsetv6 jump nat_POST_foobar_012
ip6 saddr 1234:5678::2:2:0/112 ip6 daddr @ipsetv6 return
ip6 saddr 1234:5678::2:0:0/96 ip6 daddr @ipsetv6 jump nat_POST_foobar_012
ip6 saddr 1234:5678::2:0:0/96 ip6 daddr @ipsetv6 return
ip6 saddr 1234:5678::/80 ip6 daddr @ipsetv6 jump nat_POST_foobar_012
ip6 saddr 1234:5678::/80 ip6 daddr @ipsetv6 return
ip6 saddr 1234:5678::20:20:20 ip6 daddr @ipsetv6 jump nat_POST_foobar_012
ip6 saddr 1234:5678::20:20:20 ip6 daddr @ipsetv6 return
iifname \"foobar2\" ip6 daddr @ipsetv6 jump nat_POST_foobar_012
iifname \"foobar2\" ip6 daddr @ipsetv6 return
iifname \"foobar0\" ip6 daddr @ipsetv6 jump nat_POST_foobar_012
iifname \"foobar0\" ip6 daddr @ipsetv6 return
iifname \"foobar1\" ip6 daddr @ipsetv6 jump nat_POST_foobar_012
iifname \"foobar1\" ip6 daddr @ipsetv6 return
ip6 daddr @ipsetv6 jump nat_POST_foobar_012
ip6 daddr @ipsetv6 return
ip saddr 10.1.1.1 ip daddr 10.1.0.0/16 jump nat_POST_foobar_02
ip saddr 10.1.1.1 ip daddr 10.1.0.0/16 return
ip saddr 10.1.1.0/24 ip daddr 10.1.0.0/16 jump nat_POST_foobar_02
ip saddr 10.1.1.0/24 ip daddr 10.1.0.0/16 return
ip saddr 10.10.10.10 ip daddr 10.1.0.0/16 jump nat_POST_foobar_02
ip saddr 10.10.10.10 ip daddr 10.1.0.0/16 return
ip saddr @ipsetv4 ip daddr 10.1.0.0/16 jump nat_POST_foobar_02
ip saddr @ipsetv4 ip daddr 10.1.0.0/16 return
ip saddr 10.1.0.0/16 ip daddr 10.1.0.0/16 jump nat_POST_foobar_02
ip saddr 10.1.0.0/16 ip daddr 10.1.0.0/16 return
ip saddr 10.2.2.0/24 ip daddr 10.1.0.0/16 jump nat_POST_foobar_02
ip saddr 10.2.2.0/24 ip daddr 10.1.0.0/16 return
ip saddr 10.2.0.0/16 ip daddr 10.1.0.0/16 jump nat_POST_foobar_02
ip saddr 10.2.0.0/16 ip daddr 10.1.0.0/16 return
ip saddr 10.0.0.0/8 ip daddr 10.1.0.0/16 jump nat_POST_foobar_02
ip saddr 10.0.0.0/8 ip daddr 10.1.0.0/16 return
ip saddr 20.20.20.20 ip daddr 10.1.0.0/16 jump nat_POST_foobar_02
ip saddr 20.20.20.20 ip daddr 10.1.0.0/16 return
iifname \"foobar2\" ip daddr 10.1.0.0/16 jump nat_POST_foobar_02
iifname \"foobar2\" ip daddr 10.1.0.0/16 return
iifname \"foobar0\" ip daddr 10.1.0.0/16 jump nat_POST_foobar_02
iifname \"foobar0\" ip daddr 10.1.0.0/16 return
iifname \"foobar1\" ip daddr 10.1.0.0/16 jump nat_POST_foobar_02
iifname \"foobar1\" ip daddr 10.1.0.0/16 return
ip daddr 10.1.0.0/16 jump nat_POST_foobar_02
ip daddr 10.1.0.0/16 return
ip6 saddr 1234:5678::1:1:1 ip6 daddr 1234:5678::1:0:0/96 jump nat_POST_foobar_02
ip6 saddr 1234:5678::1:1:1 ip6 daddr 1234:5678::1:0:0/96 return
ip6 saddr 1234:5678::1:1:0/112 ip6 daddr 1234:5678::1:0:0/96 jump nat_POST_foobar_02
ip6 saddr 1234:5678::1:1:0/112 ip6 daddr 1234:5678::1:0:0/96 return
ip6 saddr 1234:5678::10:10:10 ip6 daddr 1234:5678::1:0:0/96 jump nat_POST_foobar_02
ip6 saddr 1234:5678::10:10:10 ip6 daddr 1234:5678::1:0:0/96 return
ip6 saddr @ipsetv6 ip6 daddr 1234:5678::1:0:0/96 jump nat_POST_foobar_02
ip6 saddr @ipsetv6 ip6 daddr 1234:5678::1:0:0/96 return
ip6 saddr 1234:5678::1:0:0/96 ip6 daddr 1234:5678::1:0:0/96 jump nat_POST_foobar_02
ip6 saddr 1234:5678::1:0:0/96 ip6 daddr 1234:5678::1:0:0/96 return
ip6 saddr 1234:5678::2:2:0/112 ip6 daddr 1234:5678::1:0:0/96 jump nat_POST_foobar_02
ip6 saddr 1234:5678::2:2:0/112 ip6 daddr 1234:5678::1:0:0/96 return
ip6 saddr 1234:5678::2:0:0/96 ip6 daddr 1234:5678::1:0:0/96 jump nat_POST_foobar_02
ip6 saddr 1234:5678::2:0:0/96 ip6 daddr 1234:5678::1:0:0/96 return
ip6 saddr 1234:5678::/80 ip6 daddr 1234:5678::1:0:0/96 jump nat_POST_foobar_02
ip6 saddr 1234:5678::/80 ip6 daddr 1234:5678::1:0:0/96 return
ip6 saddr 1234:5678::20:20:20 ip6 daddr 1234:5678::1:0:0/96 jump nat_POST_foobar_02
ip6 saddr 1234:5678::20:20:20 ip6 daddr 1234:5678::1:0:0/96 return
iifname \"foobar2\" ip6 daddr 1234:5678::1:0:0/96 jump nat_POST_foobar_02
iifname \"foobar2\" ip6 daddr 1234:5678::1:0:0/96 return
iifname \"foobar0\" ip6 daddr 1234:5678::1:0:0/96 jump nat_POST_foobar_02
iifname \"foobar0\" ip6 daddr 1234:5678::1:0:0/96 return
iifname \"foobar1\" ip6 daddr 1234:5678::1:0:0/96 jump nat_POST_foobar_02
iifname \"foobar1\" ip6 daddr 1234:5678::1:0:0/96 return
ip6 daddr 1234:5678::1:0:0/96 jump nat_POST_foobar_02
ip6 daddr 1234:5678::1:0:0/96 return
ip saddr 10.1.1.1 ip daddr 10.2.2.0/24 jump nat_POST_foobar_03
ip saddr 10.1.1.1 ip daddr 10.2.2.0/24 return
ip saddr 10.1.1.0/24 ip daddr 10.2.2.0/24 jump nat_POST_foobar_03
ip saddr 10.1.1.0/24 ip daddr 10.2.2.0/24 return
ip saddr 10.10.10.10 ip daddr 10.2.2.0/24 jump nat_POST_foobar_03
ip saddr 10.10.10.10 ip daddr 10.2.2.0/24 return
ip saddr @ipsetv4 ip daddr 10.2.2.0/24 jump nat_POST_foobar_03
ip saddr @ipsetv4 ip daddr 10.2.2.0/24 return
ip saddr 10.1.0.0/16 ip daddr 10.2.2.0/24 jump nat_POST_foobar_03
ip saddr 10.1.0.0/16 ip daddr 10.2.2.0/24 return
ip saddr 10.2.2.0/24 ip daddr 10.2.2.0/24 jump nat_POST_foobar_03
ip saddr 10.2.2.0/24 ip daddr 10.2.2.0/24 return
ip saddr 10.2.0.0/16 ip daddr 10.2.2.0/24 jump nat_POST_foobar_03
ip saddr 10.2.0.0/16 ip daddr 10.2.2.0/24 return
ip saddr 10.0.0.0/8 ip daddr 10.2.2.0/24 jump nat_POST_foobar_03
ip saddr 10.0.0.0/8 ip daddr 10.2.2.0/24 return
ip saddr 20.20.20.20 ip daddr 10.2.2.0/24 jump nat_POST_foobar_03
ip saddr 20.20.20.20 ip daddr 10.2.2.0/24 return
iifname \"foobar2\" ip daddr 10.2.2.0/24 jump nat_POST_foobar_03
iifname \"foobar2\" ip daddr 10.2.2.0/24 return
iifname \"foobar0\" ip daddr 10.2.2.0/24 jump nat_POST_foobar_03
iifname \"foobar0\" ip daddr 10.2.2.0/24 return
iifname \"foobar1\" ip daddr 10.2.2.0/24 jump nat_POST_foobar_03
iifname \"foobar1\" ip daddr 10.2.2.0/24 return
ip daddr 10.2.2.0/24 jump nat_POST_foobar_03
ip daddr 10.2.2.0/24 return
ip6 saddr 1234:5678::1:1:1 ip6 daddr 1234:5678::2:2:0/112 jump nat_POST_foobar_03
ip6 saddr 1234:5678::1:1:1 ip6 daddr 1234:5678::2:2:0/112 return
ip6 saddr 1234:5678::1:1:0/112 ip6 daddr 1234:5678::2:2:0/112 jump nat_POST_foobar_03
ip6 saddr 1234:5678::1:1:0/112 ip6 daddr 1234:5678::2:2:0/112 return
ip6 saddr 1234:5678::10:10:10 ip6 daddr 1234:5678::2:2:0/112 jump nat_POST_foobar_03
ip6 saddr 1234:5678::10:10:10 ip6 daddr 1234:5678::2:2:0/112 return
ip6 saddr @ipsetv6 ip6 daddr 1234:5678::2:2:0/112 jump nat_POST_foobar_03
ip6 saddr @ipsetv6 ip6 daddr 1234:5678::2:2:0/112 return
ip6 saddr 1234:5678::1:0:0/96 ip6 daddr 1234:5678::2:2:0/112 jump nat_POST_foobar_03
ip6 saddr 1234:5678::1:0:0/96 ip6 daddr 1234:5678::2:2:0/112 return
ip6 saddr 1234:5678::2:2:0/112 ip6 daddr 1234:5678::2:2:0/112 jump nat_POST_foobar_03
ip6 saddr 1234:5678::2:2:0/112 ip6 daddr 1234:5678::2:2:0/112 return
ip6 saddr 1234:5678::2:0:0/96 ip6 daddr 1234:5678::2:2:0/112 jump nat_POST_foobar_03
ip6 saddr 1234:5678::2:0:0/96 ip6 daddr 1234:5678::2:2:0/112 return
ip6 saddr 1234:5678::/80 ip6 daddr 1234:5678::2:2:0/112 jump nat_POST_foobar_03
ip6 saddr 1234:5678::/80 ip6 daddr 1234:5678::2:2:0/112 return
ip6 saddr 1234:5678::20:20:20 ip6 daddr 1234:5678::2:2:0/112 jump nat_POST_foobar_03
ip6 saddr 1234:5678::20:20:20 ip6 daddr 1234:5678::2:2:0/112 return
iifname \"foobar2\" ip6 daddr 1234:5678::2:2:0/112 jump nat_POST_foobar_03
iifname \"foobar2\" ip6 daddr 1234:5678::2:2:0/112 return
iifname \"foobar0\" ip6 daddr 1234:5678::2:2:0/112 jump nat_POST_foobar_03
iifname \"foobar0\" ip6 daddr 1234:5678::2:2:0/112 return
iifname \"foobar1\" ip6 daddr 1234:5678::2:2:0/112 jump nat_POST_foobar_03
iifname \"foobar1\" ip6 daddr 1234:5678::2:2:0/112 return
ip6 daddr 1234:5678::2:2:0/112 jump nat_POST_foobar_03
ip6 daddr 1234:5678::2:2:0/112 return
ip saddr 10.1.1.1 ip daddr 10.2.0.0/16 jump nat_POST_foobar_04
ip saddr 10.1.1.1 ip daddr 10.2.0.0/16 return
ip saddr 10.1.1.0/24 ip daddr 10.2.0.0/16 jump nat_POST_foobar_04
ip saddr 10.1.1.0/24 ip daddr 10.2.0.0/16 return
ip saddr 10.10.10.10 ip daddr 10.2.0.0/16 jump nat_POST_foobar_04
ip saddr 10.10.10.10 ip daddr 10.2.0.0/16 return
ip saddr @ipsetv4 ip daddr 10.2.0.0/16 jump nat_POST_foobar_04
ip saddr @ipsetv4 ip daddr 10.2.0.0/16 return
ip saddr 10.1.0.0/16 ip daddr 10.2.0.0/16 jump nat_POST_foobar_04
ip saddr 10.1.0.0/16 ip daddr 10.2.0.0/16 return
ip saddr 10.2.2.0/24 ip daddr 10.2.0.0/16 jump nat_POST_foobar_04
ip saddr 10.2.2.0/24 ip daddr 10.2.0.0/16 return
ip saddr 10.2.0.0/16 ip daddr 10.2.0.0/16 jump nat_POST_foobar_04
ip saddr 10.2.0.0/16 ip daddr 10.2.0.0/16 return
ip saddr 10.0.0.0/8 ip daddr 10.2.0.0/16 jump nat_POST_foobar_04
ip saddr 10.0.0.0/8 ip daddr 10.2.0.0/16 return
ip saddr 20.20.20.20 ip daddr 10.2.0.0/16 jump nat_POST_foobar_04
ip saddr 20.20.20.20 ip daddr 10.2.0.0/16 return
iifname \"foobar2\" ip daddr 10.2.0.0/16 jump nat_POST_foobar_04
iifname \"foobar2\" ip daddr 10.2.0.0/16 return
iifname \"foobar0\" ip daddr 10.2.0.0/16 jump nat_POST_foobar_04
iifname \"foobar0\" ip daddr 10.2.0.0/16 return
iifname \"foobar1\" ip daddr 10.2.0.0/16 jump nat_POST_foobar_04
iifname \"foobar1\" ip daddr 10.2.0.0/16 return
ip daddr 10.2.0.0/16 jump nat_POST_foobar_04
ip daddr 10.2.0.0/16 return
ip6 saddr 1234:5678::1:1:1 ip6 daddr 1234:5678::2:0:0/96 jump nat_POST_foobar_04
ip6 saddr 1234:5678::1:1:1 ip6 daddr 1234:5678::2:0:0/96 return
ip6 saddr 1234:5678::1:1:0/112 ip6 daddr 1234:5678::2:0:0/96 jump nat_POST_foobar_04
ip6 saddr 1234:5678::1:1:0/112 ip6 daddr 1234:5678::2:0:0/96 return
ip6 saddr 1234:5678::10:10:10 ip6 daddr 1234:5678::2:0:0/96 jump nat_POST_foobar_04
ip6 saddr 1234:5678::10:10:10 ip6 daddr 1234:5678::2:0:0/96 return
ip6 saddr @ipsetv6 ip6 daddr 1234:5678::2:0:0/96 jump nat_POST_foobar_04
ip6 saddr @ipsetv6 ip6 daddr 1234:5678::2:0:0/96 return
ip6 saddr 1234:5678::1:0:0/96 ip6 daddr 1234:5678::2:0:0/96 jump nat_POST_foobar_04
ip6 saddr 1234:5678::1:0:0/96 ip6 daddr 1234:5678::2:0:0/96 return
ip6 saddr 1234:5678::2:2:0/112 ip6 daddr 1234:5678::2:0:0/96 jump nat_POST_foobar_04
ip6 saddr 1234:5678::2:2:0/112 ip6 daddr 1234:5678::2:0:0/96 return
ip6 saddr 1234:5678::2:0:0/96 ip6 daddr 1234:5678::2:0:0/96 jump nat_POST_foobar_04
ip6 saddr 1234:5678::2:0:0/96 ip6 daddr 1234:5678::2:0:0/96 return
ip6 saddr 1234:5678::/80 ip6 daddr 1234:5678::2:0:0/96 jump nat_POST_foobar_04
ip6 saddr 1234:5678::/80 ip6 daddr 1234:5678::2:0:0/96 return
ip6 saddr 1234:5678::20:20:20 ip6 daddr 1234:5678::2:0:0/96 jump nat_POST_foobar_04
ip6 saddr 1234:5678::20:20:20 ip6 daddr 1234:5678::2:0:0/96 return
iifname \"foobar2\" ip6 daddr 1234:5678::2:0:0/96 jump nat_POST_foobar_04
iifname \"foobar2\" ip6 daddr 1234:5678::2:0:0/96 return
iifname \"foobar0\" ip6 daddr 1234:5678::2:0:0/96 jump nat_POST_foobar_04
iifname \"foobar0\" ip6 daddr 1234:5678::2:0:0/96 return
iifname \"foobar1\" ip6 daddr 1234:5678::2:0:0/96 jump nat_POST_foobar_04
iifname \"foobar1\" ip6 daddr 1234:5678::2:0:0/96 return
ip6 daddr 1234:5678::2:0:0/96 jump nat_POST_foobar_04
ip6 daddr 1234:5678::2:0:0/96 return
ip saddr 10.1.1.1 ip daddr 10.0.0.0/8 jump nat_POST_foobar_05
ip saddr 10.1.1.1 ip daddr 10.0.0.0/8 return
ip saddr 10.1.1.0/24 ip daddr 10.0.0.0/8 jump nat_POST_foobar_05
ip saddr 10.1.1.0/24 ip daddr 10.0.0.0/8 return
ip saddr 10.10.10.10 ip daddr 10.0.0.0/8 jump nat_POST_foobar_05
ip saddr 10.10.10.10 ip daddr 10.0.0.0/8 return
ip saddr @ipsetv4 ip daddr 10.0.0.0/8 jump nat_POST_foobar_05
ip saddr @ipsetv4 ip daddr 10.0.0.0/8 return
ip saddr 10.1.0.0/16 ip daddr 10.0.0.0/8 jump nat_POST_foobar_05
ip saddr 10.1.0.0/16 ip daddr 10.0.0.0/8 return
ip saddr 10.2.2.0/24 ip daddr 10.0.0.0/8 jump nat_POST_foobar_05
ip saddr 10.2.2.0/24 ip daddr 10.0.0.0/8 return
ip saddr 10.2.0.0/16 ip daddr 10.0.0.0/8 jump nat_POST_foobar_05
ip saddr 10.2.0.0/16 ip daddr 10.0.0.0/8 return
ip saddr 10.0.0.0/8 ip daddr 10.0.0.0/8 jump nat_POST_foobar_05
ip saddr 10.0.0.0/8 ip daddr 10.0.0.0/8 return
ip saddr 20.20.20.20 ip daddr 10.0.0.0/8 jump nat_POST_foobar_05
ip saddr 20.20.20.20 ip daddr 10.0.0.0/8 return
iifname \"foobar2\" ip daddr 10.0.0.0/8 jump nat_POST_foobar_05
iifname \"foobar2\" ip daddr 10.0.0.0/8 return
iifname \"foobar0\" ip daddr 10.0.0.0/8 jump nat_POST_foobar_05
iifname \"foobar0\" ip daddr 10.0.0.0/8 return
iifname \"foobar1\" ip daddr 10.0.0.0/8 jump nat_POST_foobar_05
iifname \"foobar1\" ip daddr 10.0.0.0/8 return
ip daddr 10.0.0.0/8 jump nat_POST_foobar_05
ip daddr 10.0.0.0/8 return
ip6 saddr 1234:5678::1:1:1 ip6 daddr 1234:5678::/80 jump nat_POST_foobar_05
ip6 saddr 1234:5678::1:1:1 ip6 daddr 1234:5678::/80 return
ip6 saddr 1234:5678::1:1:0/112 ip6 daddr 1234:5678::/80 jump nat_POST_foobar_05
ip6 saddr 1234:5678::1:1:0/112 ip6 daddr 1234:5678::/80 return
ip6 saddr 1234:5678::10:10:10 ip6 daddr 1234:5678::/80 jump nat_POST_foobar_05
ip6 saddr 1234:5678::10:10:10 ip6 daddr 1234:5678::/80 return
ip6 saddr @ipsetv6 ip6 daddr 1234:5678::/80 jump nat_POST_foobar_05
ip6 saddr @ipsetv6 ip6 daddr 1234:5678::/80 return
ip6 saddr 1234:5678::1:0:0/96 ip6 daddr 1234:5678::/80 jump nat_POST_foobar_05
ip6 saddr 1234:5678::1:0:0/96 ip6 daddr 1234:5678::/80 return
ip6 saddr 1234:5678::2:2:0/112 ip6 daddr 1234:5678::/80 jump nat_POST_foobar_05
ip6 saddr 1234:5678::2:2:0/112 ip6 daddr 1234:5678::/80 return
ip6 saddr 1234:5678::2:0:0/96 ip6 daddr 1234:5678::/80 jump nat_POST_foobar_05
ip6 saddr 1234:5678::2:0:0/96 ip6 daddr 1234:5678::/80 return
ip6 saddr 1234:5678::/80 ip6 daddr 1234:5678::/80 jump nat_POST_foobar_05
ip6 saddr 1234:5678::/80 ip6 daddr 1234:5678::/80 return
ip6 saddr 1234:5678::20:20:20 ip6 daddr 1234:5678::/80 jump nat_POST_foobar_05
ip6 saddr 1234:5678::20:20:20 ip6 daddr 1234:5678::/80 return
iifname \"foobar2\" ip6 daddr 1234:5678::/80 jump nat_POST_foobar_05
iifname \"foobar2\" ip6 daddr 1234:5678::/80 return
iifname \"foobar0\" ip6 daddr 1234:5678::/80 jump nat_POST_foobar_05
iifname \"foobar0\" ip6 daddr 1234:5678::/80 return
iifname \"foobar1\" ip6 daddr 1234:5678::/80 jump nat_POST_foobar_05
iifname \"foobar1\" ip6 daddr 1234:5678::/80 return
ip6 daddr 1234:5678::/80 jump nat_POST_foobar_05
ip6 daddr 1234:5678::/80 return
ip6 saddr 1234:5678::1:1:1 ip6 daddr 1234:5678::20:20:20 jump nat_POST_public
ip6 saddr 1234:5678::1:1:1 ip6 daddr 1234:5678::20:20:20 return
ip6 saddr 1234:5678::1:1:0/112 ip6 daddr 1234:5678::20:20:20 jump nat_POST_public
ip6 saddr 1234:5678::1:1:0/112 ip6 daddr 1234:5678::20:20:20 return
ip6 saddr 1234:5678::10:10:10 ip6 daddr 1234:5678::20:20:20 jump nat_POST_public
ip6 saddr 1234:5678::10:10:10 ip6 daddr 1234:5678::20:20:20 return
ip6 saddr @ipsetv6 ip6 daddr 1234:5678::20:20:20 jump nat_POST_public
ip6 saddr @ipsetv6 ip6 daddr 1234:5678::20:20:20 return
ip6 saddr 1234:5678::1:0:0/96 ip6 daddr 1234:5678::20:20:20 jump nat_POST_public
ip6 saddr 1234:5678::1:0:0/96 ip6 daddr 1234:5678::20:20:20 return
ip6 saddr 1234:5678::2:2:0/112 ip6 daddr 1234:5678::20:20:20 jump nat_POST_public
ip6 saddr 1234:5678::2:2:0/112 ip6 daddr 1234:5678::20:20:20 return
ip6 saddr 1234:5678::2:0:0/96 ip6 daddr 1234:5678::20:20:20 jump nat_POST_public
ip6 saddr 1234:5678::2:0:0/96 ip6 daddr 1234:5678::20:20:20 return
ip6 saddr 1234:5678::/80 ip6 daddr 1234:5678::20:20:20 jump nat_POST_public
ip6 saddr 1234:5678::/80 ip6 daddr 1234:5678::20:20:20 return
ip6 saddr 1234:5678::20:20:20 ip6 daddr 1234:5678::20:20:20 jump nat_POST_public
ip6 saddr 1234:5678::20:20:20 ip6 daddr 1234:5678::20:20:20 return
iifname \"foobar2\" ip6 daddr 1234:5678::20:20:20 jump nat_POST_public
iifname \"foobar2\" ip6 daddr 1234:5678::20:20:20 return
iifname \"foobar0\" ip6 daddr 1234:5678::20:20:20 jump nat_POST_public
iifname \"foobar0\" ip6 daddr 1234:5678::20:20:20 return
iifname \"foobar1\" ip6 daddr 1234:5678::20:20:20 jump nat_POST_public
iifname \"foobar1\" ip6 daddr 1234:5678::20:20:20 return
ip6 daddr 1234:5678::20:20:20 jump nat_POST_public
ip6 daddr 1234:5678::20:20:20 return
ip saddr 10.1.1.1 ip daddr 20.20.20.20 jump nat_POST_public
ip saddr 10.1.1.1 ip daddr 20.20.20.20 return
ip saddr 10.1.1.0/24 ip daddr 20.20.20.20 jump nat_POST_public
ip saddr 10.1.1.0/24 ip daddr 20.20.20.20 return
ip saddr 10.10.10.10 ip daddr 20.20.20.20 jump nat_POST_public
ip saddr 10.10.10.10 ip daddr 20.20.20.20 return
ip saddr @ipsetv4 ip daddr 20.20.20.20 jump nat_POST_public
ip saddr @ipsetv4 ip daddr 20.20.20.20 return
ip saddr 10.1.0.0/16 ip daddr 20.20.20.20 jump nat_POST_public
ip saddr 10.1.0.0/16 ip daddr 20.20.20.20 return
ip saddr 10.2.2.0/24 ip daddr 20.20.20.20 jump nat_POST_public
ip saddr 10.2.2.0/24 ip daddr 20.20.20.20 return
ip saddr 10.2.0.0/16 ip daddr 20.20.20.20 jump nat_POST_public
ip saddr 10.2.0.0/16 ip daddr 20.20.20.20 return
ip saddr 10.0.0.0/8 ip daddr 20.20.20.20 jump nat_POST_public
ip saddr 10.0.0.0/8 ip daddr 20.20.20.20 return
ip saddr 20.20.20.20 ip daddr 20.20.20.20 jump nat_POST_public
ip saddr 20.20.20.20 ip daddr 20.20.20.20 return
iifname \"foobar2\" ip daddr 20.20.20.20 jump nat_POST_public
iifname \"foobar2\" ip daddr 20.20.20.20 return
iifname \"foobar0\" ip daddr 20.20.20.20 jump nat_POST_public
iifname \"foobar0\" ip daddr 20.20.20.20 return
iifname \"foobar1\" ip daddr 20.20.20.20 jump nat_POST_public
iifname \"foobar1\" ip daddr 20.20.20.20 return
ip daddr 20.20.20.20 jump nat_POST_public
ip daddr 20.20.20.20 return
oifname \"foobar2\" ip saddr 10.1.1.1 jump nat_POST_foobar_010
oifname \"foobar2\" ip saddr 10.1.1.1 return
oifname \"foobar2\" ip6 saddr 1234:5678::1:1:1 jump nat_POST_foobar_010
oifname \"foobar2\" ip6 saddr 1234:5678::1:1:1 return
oifname \"foobar2\" ip saddr 10.1.1.0/24 jump nat_POST_foobar_010
oifname \"foobar2\" ip saddr 10.1.1.0/24 return
oifname \"foobar2\" ip6 saddr 1234:5678::1:1:0/112 jump nat_POST_foobar_010
oifname \"foobar2\" ip6 saddr 1234:5678::1:1:0/112 return
oifname \"foobar2\" ip saddr 10.10.10.10 jump nat_POST_foobar_010
oifname \"foobar2\" ip saddr 10.10.10.10 return
oifname \"foobar2\" ip6 saddr 1234:5678::10:10:10 jump nat_POST_foobar_010
oifname \"foobar2\" ip6 saddr 1234:5678::10:10:10 return
oifname \"foobar2\" ip saddr @ipsetv4 jump nat_POST_foobar_010
oifname \"foobar2\" ip saddr @ipsetv4 return
oifname \"foobar2\" ip6 saddr @ipsetv6 jump nat_POST_foobar_010
oifname \"foobar2\" ip6 saddr @ipsetv6 return
oifname \"foobar2\" ip saddr 10.1.0.0/16 jump nat_POST_foobar_010
oifname \"foobar2\" ip saddr 10.1.0.0/16 return
oifname \"foobar2\" ip6 saddr 1234:5678::1:0:0/96 jump nat_POST_foobar_010
oifname \"foobar2\" ip6 saddr 1234:5678::1:0:0/96 return
oifname \"foobar2\" ip saddr 10.2.2.0/24 jump nat_POST_foobar_010
oifname \"foobar2\" ip saddr 10.2.2.0/24 return
oifname \"foobar2\" ip6 saddr 1234:5678::2:2:0/112 jump nat_POST_foobar_010
oifname \"foobar2\" ip6 saddr 1234:5678::2:2:0/112 return
oifname \"foobar2\" ip saddr 10.2.0.0/16 jump nat_POST_foobar_010
oifname \"foobar2\" ip saddr 10.2.0.0/16 return
oifname \"foobar2\" ip6 saddr 1234:5678::2:0:0/96 jump nat_POST_foobar_010
oifname \"foobar2\" ip6 saddr 1234:5678::2:0:0/96 return
oifname \"foobar2\" ip saddr 10.0.0.0/8 jump nat_POST_foobar_010
oifname \"foobar2\" ip saddr 10.0.0.0/8 return
oifname \"foobar2\" ip6 saddr 1234:5678::/80 jump nat_POST_foobar_010
oifname \"foobar2\" ip6 saddr 1234:5678::/80 return
oifname \"foobar2\" ip6 saddr 1234:5678::20:20:20 jump nat_POST_foobar_010
oifname \"foobar2\" ip6 saddr 1234:5678::20:20:20 return
oifname \"foobar2\" ip saddr 20.20.20.20 jump nat_POST_foobar_010
oifname \"foobar2\" ip saddr 20.20.20.20 return
iifname \"foobar2\" oifname \"foobar2\" jump nat_POST_foobar_010
iifname \"foobar2\" oifname \"foobar2\" return
iifname \"foobar0\" oifname \"foobar2\" jump nat_POST_foobar_010
iifname \"foobar0\" oifname \"foobar2\" return
iifname \"foobar1\" oifname \"foobar2\" jump nat_POST_foobar_010
iifname \"foobar1\" oifname \"foobar2\" return
oifname \"foobar2\" jump nat_POST_foobar_010
oifname \"foobar2\" return
oifname \"foobar0\" ip saddr 10.1.1.1 jump nat_POST_internal
oifname \"foobar0\" ip saddr 10.1.1.1 return
oifname \"foobar0\" ip6 saddr 1234:5678::1:1:1 jump nat_POST_internal
oifname \"foobar0\" ip6 saddr 1234:5678::1:1:1 return
oifname \"foobar0\" ip saddr 10.1.1.0/24 jump nat_POST_internal
oifname \"foobar0\" ip saddr 10.1.1.0/24 return
oifname \"foobar0\" ip6 saddr 1234:5678::1:1:0/112 jump nat_POST_internal
oifname \"foobar0\" ip6 saddr 1234:5678::1:1:0/112 return
oifname \"foobar0\" ip saddr 10.10.10.10 jump nat_POST_internal
oifname \"foobar0\" ip saddr 10.10.10.10 return
oifname \"foobar0\" ip6 saddr 1234:5678::10:10:10 jump nat_POST_internal
oifname \"foobar0\" ip6 saddr 1234:5678::10:10:10 return
oifname \"foobar0\" ip saddr @ipsetv4 jump nat_POST_internal
oifname \"foobar0\" ip saddr @ipsetv4 return
oifname \"foobar0\" ip6 saddr @ipsetv6 jump nat_POST_internal
oifname \"foobar0\" ip6 saddr @ipsetv6 return
oifname \"foobar0\" ip saddr 10.1.0.0/16 jump nat_POST_internal
oifname \"foobar0\" ip saddr 10.1.0.0/16 return
oifname \"foobar0\" ip6 saddr 1234:5678::1:0:0/96 jump nat_POST_internal
oifname \"foobar0\" ip6 saddr 1234:5678::1:0:0/96 return
oifname \"foobar0\" ip saddr 10.2.2.0/24 jump nat_POST_internal
oifname \"foobar0\" ip saddr 10.2.2.0/24 return
oifname \"foobar0\" ip6 saddr 1234:5678::2:2:0/112 jump nat_POST_internal
oifname \"foobar0\" ip6 saddr 1234:5678::2:2:0/112 return
oifname \"foobar0\" ip saddr 10.2.0.0/16 jump nat_POST_internal
oifname \"foobar0\" ip saddr 10.2.0.0/16 return
oifname \"foobar0\" ip6 saddr 1234:5678::2:0:0/96 jump nat_POST_internal
oifname \"foobar0\" ip6 saddr 1234:5678::2:0:0/96 return
oifname \"foobar0\" ip saddr 10.0.0.0/8 jump nat_POST_internal
oifname \"foobar0\" ip saddr 10.0.0.0/8 return
oifname \"foobar0\" ip6 saddr 1234:5678::/80 jump nat_POST_internal
oifname \"foobar0\" ip6 saddr 1234:5678::/80 return
oifname \"foobar0\" ip6 saddr 1234:5678::20:20:20 jump nat_POST_internal
oifname \"foobar0\" ip6 saddr 1234:5678::20:20:20 return
oifname \"foobar0\" ip saddr 20.20.20.20 jump nat_POST_internal
oifname \"foobar0\" ip saddr 20.20.20.20 return
iifname \"foobar2\" oifname \"foobar0\" jump nat_POST_internal
iifname \"foobar2\" oifname \"foobar0\" return
iifname \"foobar0\" oifname \"foobar0\" jump nat_POST_internal
iifname \"foobar0\" oifname \"foobar0\" return
iifname \"foobar1\" oifname \"foobar0\" jump nat_POST_internal
iifname \"foobar1\" oifname \"foobar0\" return
oifname \"foobar0\" jump nat_POST_internal
oifname \"foobar0\" return
oifname \"foobar1\" ip saddr 10.1.1.1 jump nat_POST_trusted
oifname \"foobar1\" ip saddr 10.1.1.1 return
oifname \"foobar1\" ip6 saddr 1234:5678::1:1:1 jump nat_POST_trusted
oifname \"foobar1\" ip6 saddr 1234:5678::1:1:1 return
oifname \"foobar1\" ip saddr 10.1.1.0/24 jump nat_POST_trusted
oifname \"foobar1\" ip saddr 10.1.1.0/24 return
oifname \"foobar1\" ip6 saddr 1234:5678::1:1:0/112 jump nat_POST_trusted
oifname \"foobar1\" ip6 saddr 1234:5678::1:1:0/112 return
oifname \"foobar1\" ip saddr 10.10.10.10 jump nat_POST_trusted
oifname \"foobar1\" ip saddr 10.10.10.10 return
oifname \"foobar1\" ip6 saddr 1234:5678::10:10:10 jump nat_POST_trusted
oifname \"foobar1\" ip6 saddr 1234:5678::10:10:10 return
oifname \"foobar1\" ip saddr @ipsetv4 jump nat_POST_trusted
oifname \"foobar1\" ip saddr @ipsetv4 return
oifname \"foobar1\" ip6 saddr @ipsetv6 jump nat_POST_trusted
oifname \"foobar1\" ip6 saddr @ipsetv6 return
oifname \"foobar1\" ip saddr 10.1.0.0/16 jump nat_POST_trusted
oifname \"foobar1\" ip saddr 10.1.0.0/16 return
oifname \"foobar1\" ip6 saddr 1234:5678::1:0:0/96 jump nat_POST_trusted
oifname \"foobar1\" ip6 saddr 1234:5678::1:0:0/96 return
oifname \"foobar1\" ip saddr 10.2.2.0/24 jump nat_POST_trusted
oifname \"foobar1\" ip saddr 10.2.2.0/24 return
oifname \"foobar1\" ip6 saddr 1234:5678::2:2:0/112 jump nat_POST_trusted
oifname \"foobar1\" ip6 saddr 1234:5678::2:2:0/112 return
oifname \"foobar1\" ip saddr 10.2.0.0/16 jump nat_POST_trusted
oifname \"foobar1\" ip saddr 10.2.0.0/16 return
oifname \"foobar1\" ip6 saddr 1234:5678::2:0:0/96 jump nat_POST_trusted
oifname \"foobar1\" ip6 saddr 1234:5678::2:0:0/96 return
oifname \"foobar1\" ip saddr 10.0.0.0/8 jump nat_POST_trusted
oifname \"foobar1\" ip saddr 10.0.0.0/8 return
oifname \"foobar1\" ip6 saddr 1234:5678::/80 jump nat_POST_trusted
oifname \"foobar1\" ip6 saddr 1234:5678::/80 return
oifname \"foobar1\" ip6 saddr 1234:5678::20:20:20 jump nat_POST_trusted
oifname \"foobar1\" ip6 saddr 1234:5678::20:20:20 return
oifname \"foobar1\" ip saddr 20.20.20.20 jump nat_POST_trusted
oifname \"foobar1\" ip saddr 20.20.20.20 return
iifname \"foobar2\" oifname \"foobar1\" jump nat_POST_trusted
iifname \"foobar2\" oifname \"foobar1\" return
iifname \"foobar0\" oifname \"foobar1\" jump nat_POST_trusted
iifname \"foobar0\" oifname \"foobar1\" return
iifname \"foobar1\" oifname \"foobar1\" jump nat_POST_trusted
iifname \"foobar1\" oifname \"foobar1\" return
oifname \"foobar1\" jump nat_POST_trusted
oifname \"foobar1\" return
ip saddr 10.1.1.1 jump nat_POST_public
ip saddr 10.1.1.1 return
ip6 saddr 1234:5678::1:1:1 jump nat_POST_public
ip6 saddr 1234:5678::1:1:1 return
ip saddr 10.1.1.0/24 jump nat_POST_public
ip saddr 10.1.1.0/24 return
ip6 saddr 1234:5678::1:1:0/112 jump nat_POST_public
ip6 saddr 1234:5678::1:1:0/112 return
ip saddr 10.10.10.10 jump nat_POST_public
ip saddr 10.10.10.10 return
ip6 saddr 1234:5678::10:10:10 jump nat_POST_public
ip6 saddr 1234:5678::10:10:10 return
ip saddr @ipsetv4 jump nat_POST_public
ip saddr @ipsetv4 return
ip6 saddr @ipsetv6 jump nat_POST_public
ip6 saddr @ipsetv6 return
ip saddr 10.1.0.0/16 jump nat_POST_public
ip saddr 10.1.0.0/16 return
ip6 saddr 1234:5678::1:0:0/96 jump nat_POST_public
ip6 saddr 1234:5678::1:0:0/96 return
ip saddr 10.2.2.0/24 jump nat_POST_public
ip saddr 10.2.2.0/24 return
ip6 saddr 1234:5678::2:2:0/112 jump nat_POST_public
ip6 saddr 1234:5678::2:2:0/112 return
ip saddr 10.2.0.0/16 jump nat_POST_public
ip saddr 10.2.0.0/16 return
ip6 saddr 1234:5678::2:0:0/96 jump nat_POST_public
ip6 saddr 1234:5678::2:0:0/96 return
ip saddr 10.0.0.0/8 jump nat_POST_public
ip saddr 10.0.0.0/8 return
ip6 saddr 1234:5678::/80 jump nat_POST_public
ip6 saddr 1234:5678::/80 return
ip6 saddr 1234:5678::20:20:20 jump nat_POST_public
ip6 saddr 1234:5678::20:20:20 return
ip saddr 20.20.20.20 jump nat_POST_public
ip saddr 20.20.20.20 return
iifname \"foobar2\" jump nat_POST_public
iifname \"foobar2\" return
iifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" return
iifname \"foobar1\" jump nat_POST_public
iifname \"foobar1\" return
jump nat_POST_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }
















        if test x"" != x"ignore"; then
            $as_echo "rhbz1734765.at:877" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:877"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_125
#AT_START_126
at_fn_group_banner 126 'gh509.at:1' \
  "missing firewalld.conf file" "                    " 5
at_xfail=no
(
  $as_echo "126. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh509.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh509.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh509.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh509.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh509.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh509.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh509.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh509.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh509.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh509.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh509.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh509.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh509.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh509.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh509.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh509.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh509.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh509.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh509.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh509.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh509.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh509.at:1"






    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :
        $as_echo "gh509.at:1" >"$at_check_line_file"
at_fn_check_skip 77 "$at_srcdir/gh509.at:1"
    fi


{ set +x
$as_echo "$at_srcdir/gh509.at:1: if ! rm ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh509.at:1"
( $at_check_trace; if ! rm ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh509.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh509.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh509.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh509.at:1"





        if test x"-e '/ERROR: Failed to load/d'               -e '/WARNING:.*No such file or directory:.*/d'               -e '/WARNING: Using fallback firewalld configuration settings/d'" != x"ignore"; then
            $as_echo "gh509.at:1" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: Failed to load/d'               -e '/WARNING:.*No such file or directory:.*/d'               -e '/WARNING: Using fallback firewalld configuration settings/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh509.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_126
#AT_START_127
at_fn_group_banner 127 'gh567.at:1' \
  "rich rule source w/ mark action" "                " 5
at_xfail=no
(
  $as_echo "127. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh567.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh567.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh567.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh567.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh567.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh567.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh567.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh567.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh567.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh567.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh567.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh567.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh567.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh567.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh567.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh567.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh567.at:1"








    { set +x
$as_echo "$at_srcdir/gh567.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh567.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \\; } "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "gh567.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft flush set inet firewalld_check_ipset foobar >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh567.at:3"
                $as_echo "gh567.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout { type ipv4_addr \; timeout 600s \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh567.at:3"
                $as_echo "gh567.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_size { type ipv4_addr \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh567.at:3"
        $as_echo "gh567.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout_size { type ipv4_addr \; timeout 600s \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh567.at:3"

                $as_echo "gh567.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_interval_concat { type ipv4_addr . inet_service \; flags interval \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh567.at:3"
                $as_echo "gh567.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -j '{"nftables": [{"add": {"element": {"family": "inet", "table": "firewalld_check_ipset", "name": "foobar_interval_concat", "elem": [{"concat": [{"prefix": {"addr": "10.10.10.0", "len": 24}}, {"range": ["1234", "2000"]}]}]}}}]}' >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh567.at:3"


    { set +x
$as_echo "$at_srcdir/gh567.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh567.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset=Teste --type=hash:net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset=Teste --type=hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh567.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-rich-rule \"rule family=ipv4 source ipset=Teste mark set=2\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-rich-rule "rule family=ipv4 source ipset=Teste mark set=2"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh567.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh567.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "gh567.at:9" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh567.at:9"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_127
#AT_START_128
at_fn_group_banner 128 'rhbz1779835.at:1' \
  "ipv6 address with brackets" "                     " 5
at_xfail=no
(
  $as_echo "128. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1779835.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1779835.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1779835.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1779835.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1779835.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1779835.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \\; } "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "rhbz1779835.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft flush set inet firewalld_check_ipset foobar >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:3"
                $as_echo "rhbz1779835.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout { type ipv4_addr \; timeout 600s \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:3"
                $as_echo "rhbz1779835.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_size { type ipv4_addr \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:3"
        $as_echo "rhbz1779835.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout_size { type ipv4_addr \; timeout 600s \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:3"

                $as_echo "rhbz1779835.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_interval_concat { type ipv4_addr . inet_service \; flags interval \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:3"
                $as_echo "rhbz1779835.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -j '{"nftables": [{"add": {"element": {"family": "inet", "table": "firewalld_check_ipset", "name": "foobar_interval_concat", "elem": [{"concat": [{"prefix": {"addr": "10.10.10.0", "len": 24}}, {"range": ["1234", "2000"]}]}]}}}]}' >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:3"


    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --family=inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --family=inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry='[1234::4321]' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry='[1234::4321]'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar2 --type=hash:net --family=inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar2 --type=hash:net --family=inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar2 --add-entry='[1234::]/64' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar2 --add-entry='[1234::]/64'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "rhbz1779835.at:14" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:14"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_128
#AT_START_129
at_fn_group_banner 129 'rhbz1779835.at:16' \
  "ipv6 address with brackets" "                     " 5
at_xfail=no
(
  $as_echo "129. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:16"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1779835.at:16"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1779835.at:16"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:16"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1779835.at:16" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:16"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1779835.at:16"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1779835.at:16" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:16"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1779835.at:16" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:16"













    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-source='[::1234]' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-source='[::1234]'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-source='[1234::]/64' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-source='[1234::]/64'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-forward-port=port=1234:proto=tcp:toport=4321:toaddr=[::1234] "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-forward-port=port=1234:proto=tcp:toport=4321:toaddr=[::1234]
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[::4321] forward-port port=\"1234\" protocol=tcp to-port=\"4321\" to-addr=\"[::1234]\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[::4321] forward-port port="1234" protocol=tcp to-port="4321" to-addr="[::1234]"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[1234::]/64 forward-port port=\"1234\" protocol=tcp to-port=\"4321\" to-addr=\"[::1234]\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[1234::]/64 forward-port port="1234" protocol=tcp to-port="4321" to-addr="[::1234]"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[::4321] accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[::4321] accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[1234::]/64 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[1234::]/64 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 destination address=[::4321] accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 destination address=[::4321] accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 destination address=[1234::]/64 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 destination address=[1234::]/64 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1779835.at:36" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:36"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_129
#AT_START_130
at_fn_group_banner 130 'gh330.at:1' \
  "ipset cleanup on reload/stop" "                   " 5
at_xfail=no
(
  $as_echo "130. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh330.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh330.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh330.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh330.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh330.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh330.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh330.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh330.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh330.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh330.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh330.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh330.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh330.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh330.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh330.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh330.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh330.at:1"





{ set +x
$as_echo "$at_srcdir/gh330.at:4: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh330.at:4"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh330.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/gh330.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 1.2.3.4 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh330.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/gh330.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh330.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







{ set +x
$as_echo "$at_srcdir/gh330.at:30: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh330.at:30"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh330.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset foobar --add-entry 10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset foobar --add-entry 10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/gh330.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 1.2.3.4, 10.10.10.10 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh330.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/gh330.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 1.2.3.4, 10.10.10.10 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh330.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset foobar --add-entry 4.3.2.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset foobar --add-entry 4.3.2.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/gh330.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 1.2.3.4, 4.3.2.1,
10.10.10.10 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh330.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 6.6.6.6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 6.6.6.6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/gh330.at:107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 1.2.3.4, 4.3.2.1,
6.6.6.6, 10.10.10.10 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh330.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/gh330.at:120: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh330.at:120"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh330.at:121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:121"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }






    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh330.at:123" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh330.at:123"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh330.at:123" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh330.at:123"





    { set +x
$as_echo "$at_srcdir/gh330.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }





    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }









    { set +x
$as_echo "$at_srcdir/gh330.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 1.2.3.4 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh330.at:142" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh330.at:142"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh330.at:142" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh330.at:142"




        if test x"" != x"ignore"; then
            $as_echo "gh330.at:144" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh330.at:144"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_130
#AT_START_131
at_fn_group_banner 131 'gh599.at:1' \
  "writing to log after copytruncate" "              " 5
at_xfail=no
(
  $as_echo "131. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh599.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh599.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh599.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh599.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh599.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh599.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh599.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh599.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh599.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh599.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh599.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh599.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh599.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh599.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh599.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh599.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh599.at:1"





$as_echo "gh599.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which truncate >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh599.at:4"
$as_echo "gh599.at:5" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which wc >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh599.at:5"
$as_echo "gh599.at:6" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which expr >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh599.at:6"


    { set +x
$as_echo "$at_srcdir/gh599.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} truncate -s 0 ./firewalld.log "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} truncate -s 0 ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh599.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=this_does_not_exist "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=this_does_not_exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/gh599.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh599.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} expr \$(cat ./firewalld.log | wc -c) \">\" 0 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh599.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} expr $(cat ./firewalld.log | wc -c) ">" 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }





        if test x"-e '/ERROR: INVALID_SERVICE: this_does_not_exist/d'" != x"ignore"; then
            $as_echo "gh599.at:17" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_SERVICE: this_does_not_exist/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh599.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_131
#AT_START_132
at_fn_group_banner 132 'rhbz1843398.at:1' \
  "rich rule source mac" "                           " 5
at_xfail=no
(
  $as_echo "132. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1843398.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1843398.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1843398.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1843398.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1843398.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1843398.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1843398.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1843398.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1843398.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule source mac=\"11:22:33:44:55:66\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule source mac="11:22:33:44:55:66" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule='rule source mac=\"11:22:33:44:55:66\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule='rule source mac="11:22:33:44:55:66" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "rhbz1843398.at:8" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1843398.at:8"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_132
#AT_START_133
at_fn_group_banner 133 'rhbz1839781.at:1' \
  "service RH-Satellite-6" "                         " 5
at_xfail=no
(
  $as_echo "133. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1839781.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1839781.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1839781.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1839781.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1839781.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1839781.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1839781.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1839781.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1839781.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --add-interface dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --add-interface dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --add-service RH-Satellite-6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --add-service RH-Satellite-6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_trusted_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1839781.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_trusted_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_trusted_allow {
tcp dport 53 accept
udp dport 53 accept
tcp dport 80 accept
tcp dport 443 accept
udp dport 67 accept
udp dport 69 ct helper set \"helper-tftp-udp\"
udp dport 69 accept
udp dport 68 accept
tcp dport 8140 accept
tcp dport 5000 accept
tcp dport 5646-5647 accept
tcp dport 5671 accept
tcp dport 8000 accept
tcp dport 8080 accept
tcp dport 9090 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --remove-service RH-Satellite-6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --remove-service RH-Satellite-6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --add-service RH-Satellite-6-capsule "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --add-service RH-Satellite-6-capsule
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_trusted_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1839781.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_trusted_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_trusted_allow {
tcp dport 53 accept
udp dport 53 accept
tcp dport 80 accept
tcp dport 443 accept
udp dport 67 accept
udp dport 69 ct helper set \"helper-tftp-udp\"
udp dport 69 accept
udp dport 68 accept
tcp dport 8140 accept
tcp dport 5000 accept
tcp dport 5646-5647 accept
tcp dport 5671 accept
tcp dport 8000 accept
tcp dport 8080 accept
tcp dport 9090 accept
tcp dport 8443 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }
















        if test x"" != x"ignore"; then
            $as_echo "rhbz1839781.at:123" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1839781.at:123"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_133
#AT_START_134
at_fn_group_banner 134 'rhbz1689429.at:1' \
  "rich rule invalid priority" "                     " 5
at_xfail=no
(
  $as_echo "134. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1689429.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1689429.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1689429.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1689429.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1689429.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1689429.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1689429.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1689429.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1689429.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=foo accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=foo accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "Error: INVALID_PRIORITY: invalid 'priority' attribute value 'foo'.
" | \
  $at_diff - "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 139 $at_status "$at_srcdir/rhbz1689429.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule priority=foo accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule priority=foo accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "Error: INVALID_PRIORITY: invalid 'priority' attribute value 'foo'.
" | \
  $at_diff - "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 139 $at_status "$at_srcdir/rhbz1689429.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"ignore" != x"ignore"; then
            $as_echo "rhbz1689429.at:12" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1689429.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_134
#AT_START_135
at_fn_group_banner 135 'rhbz1483921.at:1' \
  "direct and zone mutually exclusive" "             " 5
at_xfail=no
(
  $as_echo "135. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1483921.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1483921.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1483921.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1483921.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1483921.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1483921.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1483921.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1483921.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1483921.at:1"






        $as_echo "rhbz1483921.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1483921.at:3"






    { set +x
$as_echo "$at_srcdir/rhbz1483921.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --permanent --direct --add-rule ipv4 nat OUTPUT 1 -p tcp --dport 8443 -j DNAT --to-port 9443 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --permanent --direct --add-rule ipv4 nat OUTPUT 1 -p tcp --dport 8443 -j DNAT --to-port 9443
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1483921.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1483921.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --direct --add-rule ipv4 nat OUTPUT 1 -p tcp --dport 8443 -j DNAT --to-port 9443 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --direct --add-rule ipv4 nat OUTPUT 1 -p tcp --dport 8443 -j DNAT --to-port 9443
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1483921.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1483921.at:9" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1483921.at:9"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_135
#AT_START_136
at_fn_group_banner 136 'rhbz1541077.at:1' \
  "hash:mac and family mutually exclusive" "         " 5
at_xfail=no
(
  $as_echo "136. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1541077.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1541077.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1541077.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1541077.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1541077.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1541077.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1541077.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1541077.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1541077.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1541077.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset hashmacv6 --type hash:mac --family inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset hashmacv6 --type hash:mac --family inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1541077.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1541077.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --new-ipset hashmacv6 --type hash:mac --family inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --new-ipset hashmacv6 --type hash:mac --family inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1541077.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rhbz1541077.at:7: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --new-ipset hashmacv6 --type hash:mac --family inet6"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --new-ipset hashmacv6 --type hash:mac --family inet6" "rhbz1541077.at:7"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --new-ipset hashmacv6 --type hash:mac --family inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1541077.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





        if test x"" != x"ignore"; then
            $as_echo "rhbz1541077.at:9" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1541077.at:9"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_136
#AT_START_137
at_fn_group_banner 137 'rhbz1855140.at:1' \
  "rich rule icmptypes with one family" "            " 5
at_xfail=no
(
  $as_echo "137. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1855140.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1855140.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1855140.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1855140.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1855140.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1855140.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1855140.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1855140.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1855140.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name=\"neighbour-advertisement\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name="neighbour-advertisement" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name=\"timestamp-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name="timestamp-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule 'rule icmp-type name=bad-header mark set=0x86/0x86' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule 'rule icmp-type name=bad-header mark set=0x86/0x86'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1855140.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_public_allow {
icmpv6 parameter-problem icmpv6 code no-route mark set mark & 0x00000086 ^ 0x00000086
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1855140.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 accept
ip6 daddr fe80::/64 udp dport 546 accept
icmp echo-request accept
icmpv6 echo-request accept
icmpv6 nd-neighbor-advert accept
icmp timestamp-request accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }






















    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule 'rule icmp-type name=bogus mark set=0x86/0x86' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule 'rule icmp-type name=bogus mark set=0x86/0x86'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/rhbz1855140.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule 'rule icmp-type name=bogus mark set=0x86/0x86' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule 'rule icmp-type name=bogus mark set=0x86/0x86'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/rhbz1855140.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule 'rule family=ipv6 icmp-type name=timestamp-request drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule 'rule family=ipv6 icmp-type name=timestamp-request drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/rhbz1855140.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule 'rule family=ipv6 icmp-type name=timestamp-request drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule 'rule family=ipv6 icmp-type name=timestamp-request drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/rhbz1855140.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"-e '/ERROR: INVALID_ICMPTYPE:/d'" != x"ignore"; then
            $as_echo "rhbz1855140.at:53" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ICMPTYPE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1855140.at:53"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_137
#AT_START_138
at_fn_group_banner 138 'rhbz1871298.at:1' \
  "rich rule parsing bottleneck" "                   " 5
at_xfail=no
(
  $as_echo "138. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1871298.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1871298.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1871298.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1871298.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1871298.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1871298.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1871298.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1871298.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1871298.at:1"





$as_echo "rhbz1871298.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which timeout >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1871298.at:4"


    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} mkdir -p ./zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} echo \"<zone>\" >> ./zones/foobar.xml "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} echo "<zone>" >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} echo \"<short>foobar</short>\" >> ./zones/foobar.xml "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} echo "<short>foobar</short>" >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sh -c 'for I in \$(seq 10000); do echo \"<rule family=\\\"ipv4\\\"><port protocol=\\\"tcp\\\" port=\\\"\$I\\\" /><accept/></rule>\" >> ./zones/foobar.xml; done' "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1871298.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c 'for I in $(seq 10000); do echo "<rule family=\"ipv4\"><port protocol=\"tcp\" port=\"$I\" /><accept/></rule>" >> ./zones/foobar.xml; done'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} echo \"</zone>\" >> ./zones/foobar.xml "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} echo "</zone>" >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }



if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
    FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
fi

    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} timeout 120 firewall-offline-cmd --system-config ./ \$FIREWALL_OFFLINE_CMD_ARGS --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} timeout 120 firewall-offline-cmd --system-config ./ $FIREWALL_OFFLINE_CMD_ARGS --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }





        if test x"" != x"ignore"; then
            $as_echo "rhbz1871298.at:18" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1871298.at:18"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_138
#AT_START_139
at_fn_group_banner 139 'rhbz1596304.at:1' \
  "rich rules strip non-printable characters" "      " 5
at_xfail=no
(
  $as_echo "139. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1596304.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1596304.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1596304.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1596304.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1596304.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1596304.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1596304.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1596304.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1596304.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-rich-rule 'rule family=\"ipv4\" source address=\"104.243.250.0/22	\" port port=80 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-rich-rule 'rule family="ipv4" source address="104.243.250.0/22	" port port=80 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1596304.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public (default, active)
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv4\" source address=\"104.243.250.0/22\" port port=\"80\" protocol=\"tcp\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "rhbz1596304.at:26" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1596304.at:26"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_139
#AT_START_140
at_fn_group_banner 140 'gh703.at:1' \
  "add source with mac address" "                    " 5
at_xfail=no
(
  $as_echo "140. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh703.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh703.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh703.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh703.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh703.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh703.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh703.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh703.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh703.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh703.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh703.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh703.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh703.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh703.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh703.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh703.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh703.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh703.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh703.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh703.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh703.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh703.at:1"








    { set +x
$as_echo "$at_srcdir/gh703.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --add-source=34:7e:5c:3a:4c:32 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh703.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --add-source=34:7e:5c:3a:4c:32
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh703.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh703.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES {
ether daddr 34:7e:5c:3a:4c:32 ether saddr 34:7e:5c:3a:4c:32 jump nat_POST_home
ether daddr 34:7e:5c:3a:4c:32 ether saddr 34:7e:5c:3a:4c:32 return
ether daddr 34:7e:5c:3a:4c:32 jump nat_POST_home
ether daddr 34:7e:5c:3a:4c:32 return
ether saddr 34:7e:5c:3a:4c:32 jump nat_POST_public
ether saddr 34:7e:5c:3a:4c:32 return
jump nat_POST_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            $as_echo "gh703.at:23" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh703.at:23"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_140
#AT_START_141
at_fn_group_banner 141 'ipset_netmask_allowed.at:1' \
  "ipset netmask allowed type hash:ip" "             " 5
at_xfail=no
(
  $as_echo "141. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "ipset_netmask_allowed.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "ipset_netmask_allowed.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "ipset_netmask_allowed.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ipset_netmask_allowed.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "ipset_netmask_allowed.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "ipset_netmask_allowed.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ipset_netmask_allowed.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "ipset_netmask_allowed.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/ipset_netmask_allowed.at:1"








    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.4/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.4/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 4.3.2.1/32 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 4.3.2.1/32
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 4.3.2.1/32 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 4.3.2.1/32
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/ipset_netmask_allowed.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/ipset_netmask_allowed.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4/30 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4/30
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/ipset_netmask_allowed.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.4/30 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.4/30
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/ipset_netmask_allowed.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_ENTRY:/d'" != x"ignore"; then
            $as_echo "ipset_netmask_allowed.at:25" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ENTRY:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/ipset_netmask_allowed.at:25"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_141
#AT_START_142
at_fn_group_banner 142 'rhbz1940928.at:1' \
  "direct -s/-d multiple addresses" "                " 5
at_xfail=no
(
  $as_echo "142. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1940928.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1940928.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1940928.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1940928.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1940928.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1940928.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1940928.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1940928.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1940928.at:1"






        $as_echo "rhbz1940928.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1940928.at:3"



{ set +x
$as_echo "$at_srcdir/rhbz1940928.at:7: sed -i 's/^IndividualCalls.*/IndividualCalls=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1940928.at:7"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 9 -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 9 -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1940928.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT 6 -- 0.0.0.0/0 10.0.0.0/8
ACCEPT 6 -- 0.0.0.0/0 172.16.0.0/16
ACCEPT 6 -- 0.0.0.0/0 192.168.0.0/24
ACCEPT 17 -- 0.0.0.0/0 10.0.0.0/8
ACCEPT 17 -- 0.0.0.0/0 172.16.0.0/16
ACCEPT 17 -- 0.0.0.0/0 192.168.0.0/24
DROP 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1940928.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT 132 -- 0.0.0.0/0 10.0.0.0/8
ACCEPT 132 -- 0.0.0.0/0 172.16.0.0/16
ACCEPT 132 -- 0.0.0.0/0 192.168.0.0/24
ACCEPT 6 -- 0.0.0.0/0 10.0.0.0/8
ACCEPT 6 -- 0.0.0.0/0 172.16.0.0/16
ACCEPT 6 -- 0.0.0.0/0 192.168.0.0/24
ACCEPT 17 -- 0.0.0.0/0 10.0.0.0/8
ACCEPT 17 -- 0.0.0.0/0 172.16.0.0/16
ACCEPT 17 -- 0.0.0.0/0 192.168.0.0/24
DROP 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 9 -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 9 -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1940928.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1940928.at:52" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1940928.at:52"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_142
#AT_START_143
at_fn_group_banner 143 'rhbz1936896.at:1' \
  "ipset type hash:net,net" "                        " 5
at_xfail=no
(
  $as_echo "143. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1936896.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1936896.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1936896.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1936896.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1936896.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1936896.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1936896.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1936896.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1936896.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \\; } "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "rhbz1936896.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft flush set inet firewalld_check_ipset foobar >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1936896.at:3"
                $as_echo "rhbz1936896.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout { type ipv4_addr \; timeout 600s \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1936896.at:3"
                $as_echo "rhbz1936896.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_size { type ipv4_addr \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1936896.at:3"
        $as_echo "rhbz1936896.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout_size { type ipv4_addr \; timeout 600s \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1936896.at:3"

                $as_echo "rhbz1936896.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_interval_concat { type ipv4_addr . inet_service \; flags interval \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1936896.at:3"
                $as_echo "rhbz1936896.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -j '{"nftables": [{"add": {"element": {"family": "inet", "table": "firewalld_check_ipset", "name": "foobar_interval_concat", "elem": [{"concat": [{"prefix": {"addr": "10.10.10.0", "len": 24}}, {"range": ["1234", "2000"]}]}]}}}]}' >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1936896.at:3"


    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset testset --type hash:net,net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset testset --type hash:net,net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=testset --add-entry=192.168.0.0/24,10.0.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=testset --add-entry=192.168.0.0/24,10.0.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-ipset=testset | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1936896.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-ipset=testset | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "testset
type: hash:net,net
options:
entries: 192.168.0.0/24,10.0.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld testset; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1936896.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld testset; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set testset {
type ipv4_addr . ipv4_addr
flags interval
elements = { 192.168.0.0/24 . 10.0.1.0/24 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"" != x"ignore"; then
            $as_echo "rhbz1936896.at:32" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1936896.at:32"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_143
#AT_START_144
at_fn_group_banner 144 'gh795.at:1' \
  "ipset entry delete w/ timeout=0" "                " 5
at_xfail=no
(
  $as_echo "144. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh795.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh795.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh795.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh795.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh795.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh795.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh795.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh795.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh795.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh795.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh795.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh795.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh795.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh795.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh795.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh795.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh795.at:1"








    { set +x
$as_echo "$at_srcdir/gh795.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type=hash:ip --option=timeout=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type=hash:ip --option=timeout=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh795.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh795.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "Warning: ALREADY_ENABLED: '1.2.3.4' already is in 'foobar'
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --remove-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --remove-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh795.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh795.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 1.2.3.4 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/gh795.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --remove-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --remove-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/WARNING: ALREADY_ENABLED:/d'" != x"ignore"; then
            $as_echo "gh795.at:48" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/WARNING: ALREADY_ENABLED:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh795.at:48"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_144
#AT_START_145
at_fn_group_banner 145 'rhbz1914935.at:1' \
  "zone overlapping ports" "                         " 5
at_xfail=no
(
  $as_echo "145. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1914935.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1914935.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1914935.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1914935.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1914935.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1914935.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1914935.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1914935.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1914935.at:1"





{ set +x
$as_echo "$at_srcdir/rhbz1914935.at:4: mkdir -p ./zones"
at_fn_check_prepare_trace "rhbz1914935.at:4"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port port="1024-65535" protocol="tcp" />
<port port="1234" protocol="tcp" />
<port port="2000-3000" protocol="tcp" />
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:15: grep \"WARNING: ALREADY_ENABLED: '1234:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:15"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '1234:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:16: grep \"WARNING: ALREADY_ENABLED: '2000-3000:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:16"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '2000-3000:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1024-65535/tcp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="1024-65535" protocol="tcp" />
<source-port port="1234" protocol="tcp" />
<source-port port="2000-3000" protocol="tcp" />
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:30: grep \"WARNING: ALREADY_ENABLED: '1234:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:30"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '1234:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:31: grep \"WARNING: ALREADY_ENABLED: '2000-3000:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:31"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '2000-3000:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1024-65535/tcp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port port="1024-2000" protocol="tcp" />
<port port="1500-2500" protocol="tcp" />
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:45: grep \"WARNING: ALREADY_ENABLED: '1500-2500:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:45"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '1500-2500:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1914935.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1024-2500/tcp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="1024-2000" protocol="tcp" />
<source-port port="1500-2500" protocol="tcp" />
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:59: grep \"WARNING: ALREADY_ENABLED: '1500-2500:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:59"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '1500-2500:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1914935.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1024-2500/tcp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/WARNING: ALREADY_ENABLED:/d'" != x"ignore"; then
            $as_echo "rhbz1914935.at:64" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/WARNING: ALREADY_ENABLED:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1914935.at:64"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_145
#AT_START_146
at_fn_group_banner 146 'gh696.at:1' \
  "icmp-block-inversion no log blocked" "            " 5
at_xfail=no
(
  $as_echo "146. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh696.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh696.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh696.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh696.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh696.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh696.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh696.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh696.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh696.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh696.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh696.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh696.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh696.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh696.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh696.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh696.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh696.at:1"








    { set +x
$as_echo "$at_srcdir/gh696.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --remove-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh696.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh696.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh696.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh696.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh696.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_deny {
icmp echo-request reject with icmpx admin-prohibited
icmpv6 echo-request reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/gh696.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-log-denied all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-log-denied all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh696.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh696.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_deny {
icmp echo-request log prefix \"filter_zone_public_HOST_ICMP_BLOCK: \"
icmp echo-request reject with icmpx admin-prohibited
icmpv6 echo-request log prefix \"filter_zone_public_HOST_ICMP_BLOCK: \"
icmpv6 echo-request reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }


















    { set +x
$as_echo "$at_srcdir/gh696.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh696.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-log-denied off "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-log-denied off
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh696.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh696.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 accept
ip6 daddr fe80::/64 udp dport 546 accept
icmp echo-request accept
icmpv6 echo-request accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/gh696.at:79:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-log-denied all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:79"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-log-denied all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh696.at:81:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh696.at:81"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 accept
ip6 daddr fe80::/64 udp dport 546 accept
icmp echo-request accept
icmpv6 echo-request accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:81"
$at_failed && at_fn_log_failure
$at_traceon; }
















        if test x"-d '/WARNING: NOT_ENABLED: icmp-block-inversion/d'" != x"ignore"; then
            $as_echo "gh696.at:102" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -d '/WARNING: NOT_ENABLED: icmp-block-inversion/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh696.at:102"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_146
#AT_START_147
at_fn_group_banner 147 'rhbz1917766.at:1' \
  "rich rule source with netmask" "                  " 5
at_xfail=no
(
  $as_echo "147. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1917766.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1917766.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1917766.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1917766.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1917766.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1917766.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1917766.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1917766.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1917766.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1917766.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1917766.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1917766.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1917766.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1917766.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1917766.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1917766.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1917766.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1917766.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1917766.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1917766.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1917766.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1917766.at:1"









    { set +x
$as_echo "$at_srcdir/rhbz1917766.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --zone public --add-rich-rule='rule family=ipv4 source address=\"192.168.1.0/255.255.255.0\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1917766.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --zone public --add-rich-rule='rule family=ipv4 source address="192.168.1.0/255.255.255.0" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1917766.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule family=ipv4 source address=\"192.168.1.0/255.255.255.0\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1917766.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule family=ipv4 source address="192.168.1.0/255.255.255.0" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <short>foobar</short>
  <description>foobar</description>
  <rule family="ipv4">
    <source address="192.168.0.1/255.255.255.240"/>
    <accept/>
  </rule>
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz1917766.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1917766.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1917766.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1917766.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1917766.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1917766.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1917766.at:24" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1917766.at:24"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_147
#AT_START_148
at_fn_group_banner 148 'rhbz2014383.at:1' \
  "same source in two zone xml" "                    " 5
at_xfail=no
(
  $as_echo "148. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz2014383.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2014383.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2014383.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz2014383.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz2014383.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2014383.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz2014383.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz2014383.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2014383.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz2014383.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2014383.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2014383.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz2014383.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz2014383.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz2014383.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2014383.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2014383.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz2014383.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz2014383.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2014383.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz2014383.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2014383.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2014383.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz2014383.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2014383.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2014383.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz2014383.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz2014383.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz2014383.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz2014383.at:1"





{ set +x
$as_echo "$at_srcdir/rhbz2014383.at:4: mkdir -p ./zones"
at_fn_check_prepare_trace "rhbz2014383.at:4"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2014383.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <short>foobar</short>
  <description>foobar</description>
  <service name="ssh"/>
  <source address="10.10.10.10"/>
  <forward/>
</zone>
_ATEOF


cat >./zones/foobar2.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <short>foobar2</short>
  <description>foobar2</description>
  <service name="ssh"/>
  <source address="10.10.10.10"/>
  <forward/>
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz2014383.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2014383.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/rhbz2014383.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }






cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <short>foobar</short>
  <description>foobar</description>
  <service name="ssh"/>
  <interface name="foobar0"/>
  <forward/>
</zone>
_ATEOF


cat >./zones/foobar2.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <short>foobar2</short>
  <description>foobar2</description>
  <service name="ssh"/>
  <interface name="foobar0"/>
  <forward/>
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz2014383.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2014383.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 104 $at_status "$at_srcdir/rhbz2014383.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"ignore" != x"ignore"; then
            $as_echo "rhbz2014383.at:56" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz2014383.at:56"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_148
#AT_START_149
at_fn_group_banner 149 'gh874.at:1' \
  "policy masquerade w/ ingress interface" "         " 5
at_xfail=no
(
  $as_echo "149. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh874.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh874.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh874.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh874.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh874.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh874.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh874.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh874.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh874.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh874.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh874.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh874.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh874.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh874.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh874.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh874.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh874.at:1"








    { set +x
$as_echo "$at_srcdir/gh874.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone foobar_zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone foobar_zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh874.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy foobar_policy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy foobar_policy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh874.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar_policy --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar_policy --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh874.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar_policy --add-ingress-zone foobar_zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar_policy --add-ingress-zone foobar_zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh874.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar_policy --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar_policy --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh874.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh874.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh874.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar_zone --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar_zone --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh874.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sed -i '2a \\
<interface name=\"foobar\" />
' ./zones/foobar_zone.xml
 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sed -i '2a \
<interface name="foobar" />
' ./zones/foobar_zone.xml

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh874.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"ignore" != x"ignore"; then
            $as_echo "gh874.at:33" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh874.at:33"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_149
#AT_START_150
at_fn_group_banner 150 'gh881.at:1' \
  "ipset entry overlap detect perf" "                " 5
at_xfail=no
(
  $as_echo "150. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh881.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh881.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh881.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh881.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh881.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh881.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh881.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh881.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh881.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh881.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh881.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh881.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh881.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh881.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh881.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh881.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh881.at:1"





: >./deny_cidr

    { set +x
$as_echo "$at_srcdir/gh881.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sh -c '
for I in \$(seq 250); do
  for J in \$(seq 250); do
    echo \"10.\${I}.\${J}.0/24\" >> ./deny_cidr
  done
done
' "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh881.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c '
for I in $(seq 250); do
  for J in $(seq 250); do
    echo "10.${I}.${J}.0/24" >> ./deny_cidr
  done
done
'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh881.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} echo \"10.254.0.0/16\" >> ./deny_cidr "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} echo "10.254.0.0/16" >> ./deny_cidr
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh881.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=deny_set --type=hash:net --option=family=inet --option=hashsize=16384 --option=maxelem=20000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=deny_set --type=hash:net --option=family=inet --option=hashsize=16384 --option=maxelem=20000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh881.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }



cat >./deny_cidr <<'_ATEOF'

9.0.0.0/8
11.1.0.0/16
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh881.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }



cat >./deny_cidr <<'_ATEOF'

10.1.0.0/16
10.2.0.0/16
10.250.0.0/16
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh881.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/gh881.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }



cat >./deny_cidr <<'_ATEOF'

10.253.0.0/16
10.253.128.0/17
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh881.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/gh881.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }



cat >./deny_cidr <<'_ATEOF'

10.1.1.1/32
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh881.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/gh881.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }



cat >./deny_cidr <<'_ATEOF'

10.0.0.0/8
10.0.0.0/25
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh881.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/gh881.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }



: >./deny_cidr



    { set +x
$as_echo "$at_srcdir/gh881.at:57:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:57"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:57"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "gh881.at:59" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh881.at:59"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_150
#AT_START_151
at_fn_group_banner 151 'service_includes_for_builtin.at:1' \
  "service include for built-in" "                   " 5
at_xfail=no
(
  $as_echo "151. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_includes_for_builtin.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "service_includes_for_builtin.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "service_includes_for_builtin.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_includes_for_builtin.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "service_includes_for_builtin.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_includes_for_builtin.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_includes_for_builtin.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "service_includes_for_builtin.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_includes_for_builtin.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_includes_for_builtin.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "service_includes_for_builtin.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_includes_for_builtin.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "service_includes_for_builtin.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/service_includes_for_builtin.at:1"






    $as_echo "service_includes_for_builtin.at:6" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_includes_for_builtin.at:6"

    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getServiceByName \"ssh\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_includes_for_builtin.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getServiceByName "ssh"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ


    $as_echo "service_includes_for_builtin.at:13" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_includes_for_builtin.at:13"

    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_includes_for_builtin.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(@as [],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service_includes_for_builtin.at:16" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_includes_for_builtin.at:16"

    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.setIncludes '[\"https\", \"http\"]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_includes_for_builtin.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.setIncludes '["https", "http"]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service_includes_for_builtin.at:17" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_includes_for_builtin.at:17"

    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_includes_for_builtin.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['https', 'http'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service_includes_for_builtin.at:20" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_includes_for_builtin.at:20"

    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.addInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_includes_for_builtin.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.addInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service_includes_for_builtin.at:21" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_includes_for_builtin.at:21"

    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_includes_for_builtin.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service_includes_for_builtin.at:24" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_includes_for_builtin.at:24"

    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.removeInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_includes_for_builtin.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.removeInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service_includes_for_builtin.at:25" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_includes_for_builtin.at:25"

    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_includes_for_builtin.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "service_includes_for_builtin.at:29" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/service_includes_for_builtin.at:29"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_151
#AT_START_152
at_fn_group_banner 152 'gh940.at:1' \
  "log prefix" "                                     " 5
at_xfail=no
(
  $as_echo "152. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh940.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh940.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh940.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh940.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh940.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh940.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh940.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh940.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh940.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh940.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh940.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh940.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh940.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh940.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh940.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh940.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh940.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh940.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh940.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh940.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh940.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh940.at:1"





{ set +x
$as_echo "$at_srcdir/gh940.at:4: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh940.at:4"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh940.at:5: sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf"
at_fn_check_prepare_trace "gh940.at:5"
( $at_check_trace; sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh940.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh940.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/gh940.at:9: mkdir -p ./policies"
at_fn_check_prepare_trace "gh940.at:9"
( $at_check_trace; mkdir -p ./policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

cat >./policies/log-denied.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<policy target="DROP" priority="1">
<short>log-denied</short>
<description>log denied policy</description>
<ingress-zone name="ANY" />
<egress-zone name="HOST" />
<icmp-block name="echo-request" />
<rule>
    <port port="6667" protocol="tcp" />
    <log prefix="Dropped IRC Packet: " level="warning" />
    <drop />
</rule>
</policy>
_ATEOF




    { set +x
$as_echo "$at_srcdir/gh940.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh940.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh940.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh940.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh940.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh940.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/gh940.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_log-denied; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh940.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_log-denied; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_log-denied {
jump filter_IN_policy_log-denied_pre
jump filter_IN_policy_log-denied_log
jump filter_IN_policy_log-denied_deny
jump filter_IN_policy_log-denied_allow
jump filter_IN_policy_log-denied_post
log prefix \"filter_IN_policy_log-denied_DROP: \"
drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh940.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh940.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
iifname \"foobar0\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar0\" jump filter_IN_public
iifname \"foobar0\" jump filter_IN_policy_log-denied
iifname \"foobar0\" log prefix \"filter_IN_public_REJECT: \"
iifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
jump filter_IN_policy_log-denied
log prefix \"filter_IN_public_REJECT: \"
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }



















    { set +x
$as_echo "$at_srcdir/gh940.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_log-denied_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh940.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_log-denied_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_log-denied_deny {
icmp echo-request log prefix \"filter_log-denied_ICMP_BLOCK: \"
icmp echo-request reject with icmpx admin-prohibited
icmpv6 echo-request log prefix \"filter_log-denied_ICMP_BLOCK: \"
icmpv6 echo-request reject with icmpx admin-prohibited
tcp dport 6667 drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }



















    { set +x
$as_echo "$at_srcdir/gh940.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_log-denied_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh940.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_log-denied_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_log-denied_log {
tcp dport 6667 log prefix \"Dropped IRC Packet: \"
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }
















        if test x"" != x"ignore"; then
            $as_echo "gh940.at:116" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh940.at:116"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_152
#AT_START_153
at_fn_group_banner 153 'build_policy_split_wildcard.at:1' \
  "build policy split wildcards" "                   " 5
at_xfail=no
(
  $as_echo "153. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "build_policy_split_wildcard.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "build_policy_split_wildcard.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "build_policy_split_wildcard.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/build_policy_split_wildcard.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "build_policy_split_wildcard.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "build_policy_split_wildcard.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/build_policy_split_wildcard.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "build_policy_split_wildcard.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/build_policy_split_wildcard.at:1"








    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-interface foobar2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-interface foobar2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-interface foobar3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-interface foobar3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-interface tun+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-interface tun+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "build_policy_split_wildcard.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"tun*\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"tun*\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar2\" jump filter_FWD_policy_foobar
iifname \"foobar0\" oifname \"foobar2\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar3\" jump filter_FWD_policy_foobar
iifname \"foobar0\" oifname \"foobar3\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar3\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_policy_foobar
iifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"tun*\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"tun*\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar2\" jump filter_FWD_policy_foobar
iifname \"foobar1\" oifname \"foobar2\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar3\" jump filter_FWD_policy_foobar
iifname \"foobar1\" oifname \"foobar3\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar3\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_FWD_policy_foobar
iifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"tun*\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"tun*\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"tun*\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"tun*\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"tun*\" oifname \"tun*\" jump filter_FWD_internal
iifname \"tun*\" oifname \"tun*\" reject with icmpx admin-prohibited
iifname \"tun*\" oifname \"foobar2\" jump filter_FWD_policy_foobar
iifname \"tun*\" oifname \"foobar2\" jump filter_FWD_internal
iifname \"tun*\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"tun*\" oifname \"foobar3\" jump filter_FWD_policy_foobar
iifname \"tun*\" oifname \"foobar3\" jump filter_FWD_internal
iifname \"tun*\" oifname \"foobar3\" reject with icmpx admin-prohibited
iifname \"tun*\" jump filter_FWD_policy_foobar
iifname \"tun*\" jump filter_FWD_internal
iifname \"tun*\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar2\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar2\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"tun*\" jump filter_FWD_public
iifname \"foobar2\" oifname \"tun*\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"foobar2\" jump filter_FWD_public
iifname \"foobar2\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"foobar3\" jump filter_FWD_public
iifname \"foobar2\" oifname \"foobar3\" reject with icmpx admin-prohibited
iifname \"foobar2\" jump filter_FWD_public
iifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar3\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar3\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar3\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar3\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar3\" oifname \"tun*\" jump filter_FWD_public
iifname \"foobar3\" oifname \"tun*\" reject with icmpx admin-prohibited
iifname \"foobar3\" oifname \"foobar2\" jump filter_FWD_public
iifname \"foobar3\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar3\" oifname \"foobar3\" jump filter_FWD_public
iifname \"foobar3\" oifname \"foobar3\" reject with icmpx admin-prohibited
iifname \"foobar3\" jump filter_FWD_public
iifname \"foobar3\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar1\" jump filter_FWD_public
oifname \"foobar1\" reject with icmpx admin-prohibited
oifname \"tun*\" jump filter_FWD_public
oifname \"tun*\" reject with icmpx admin-prohibited
oifname \"foobar2\" jump filter_FWD_public
oifname \"foobar2\" reject with icmpx admin-prohibited
oifname \"foobar3\" jump filter_FWD_public
oifname \"foobar3\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --remove-interface tun+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --remove-interface tun+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-interface tun+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-interface tun+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "build_policy_split_wildcard.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar2\" jump filter_FWD_policy_foobar
iifname \"foobar0\" oifname \"foobar2\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar3\" jump filter_FWD_policy_foobar
iifname \"foobar0\" oifname \"foobar3\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar3\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"tun*\" jump filter_FWD_policy_foobar
iifname \"foobar0\" oifname \"tun*\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"tun*\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_policy_foobar
iifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar2\" jump filter_FWD_policy_foobar
iifname \"foobar1\" oifname \"foobar2\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar3\" jump filter_FWD_policy_foobar
iifname \"foobar1\" oifname \"foobar3\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar3\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"tun*\" jump filter_FWD_policy_foobar
iifname \"foobar1\" oifname \"tun*\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"tun*\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_FWD_policy_foobar
iifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar2\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar2\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"foobar2\" jump filter_FWD_public
iifname \"foobar2\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"foobar3\" jump filter_FWD_public
iifname \"foobar2\" oifname \"foobar3\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"tun*\" jump filter_FWD_public
iifname \"foobar2\" oifname \"tun*\" reject with icmpx admin-prohibited
iifname \"foobar2\" jump filter_FWD_public
iifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar3\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar3\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar3\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar3\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar3\" oifname \"foobar2\" jump filter_FWD_public
iifname \"foobar3\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar3\" oifname \"foobar3\" jump filter_FWD_public
iifname \"foobar3\" oifname \"foobar3\" reject with icmpx admin-prohibited
iifname \"foobar3\" oifname \"tun*\" jump filter_FWD_public
iifname \"foobar3\" oifname \"tun*\" reject with icmpx admin-prohibited
iifname \"foobar3\" jump filter_FWD_public
iifname \"foobar3\" reject with icmpx admin-prohibited
iifname \"tun*\" oifname \"foobar0\" jump filter_FWD_public
iifname \"tun*\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"tun*\" oifname \"foobar1\" jump filter_FWD_public
iifname \"tun*\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"tun*\" oifname \"foobar2\" jump filter_FWD_public
iifname \"tun*\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"tun*\" oifname \"foobar3\" jump filter_FWD_public
iifname \"tun*\" oifname \"foobar3\" reject with icmpx admin-prohibited
iifname \"tun*\" oifname \"tun*\" jump filter_FWD_public
iifname \"tun*\" oifname \"tun*\" reject with icmpx admin-prohibited
iifname \"tun*\" jump filter_FWD_public
iifname \"tun*\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar1\" jump filter_FWD_public
oifname \"foobar1\" reject with icmpx admin-prohibited
oifname \"foobar2\" jump filter_FWD_public
oifname \"foobar2\" reject with icmpx admin-prohibited
oifname \"foobar3\" jump filter_FWD_public
oifname \"foobar3\" reject with icmpx admin-prohibited
oifname \"tun*\" jump filter_FWD_public
oifname \"tun*\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:201:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-interface net+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:201"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-interface net+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:201"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:202:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "build_policy_split_wildcard.at:202"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"net*\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"net*\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar2\" jump filter_FWD_policy_foobar
iifname \"foobar0\" oifname \"foobar2\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar3\" jump filter_FWD_policy_foobar
iifname \"foobar0\" oifname \"foobar3\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar3\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"tun*\" jump filter_FWD_policy_foobar
iifname \"foobar0\" oifname \"tun*\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"tun*\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_policy_foobar
iifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"net*\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"net*\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar2\" jump filter_FWD_policy_foobar
iifname \"foobar1\" oifname \"foobar2\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar3\" jump filter_FWD_policy_foobar
iifname \"foobar1\" oifname \"foobar3\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar3\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"tun*\" jump filter_FWD_policy_foobar
iifname \"foobar1\" oifname \"tun*\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"tun*\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_FWD_policy_foobar
iifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"net*\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"net*\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"net*\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"net*\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"net*\" oifname \"net*\" jump filter_FWD_internal
iifname \"net*\" oifname \"net*\" reject with icmpx admin-prohibited
iifname \"net*\" oifname \"foobar2\" jump filter_FWD_policy_foobar
iifname \"net*\" oifname \"foobar2\" jump filter_FWD_internal
iifname \"net*\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"net*\" oifname \"foobar3\" jump filter_FWD_policy_foobar
iifname \"net*\" oifname \"foobar3\" jump filter_FWD_internal
iifname \"net*\" oifname \"foobar3\" reject with icmpx admin-prohibited
iifname \"net*\" oifname \"tun*\" jump filter_FWD_policy_foobar
iifname \"net*\" oifname \"tun*\" jump filter_FWD_internal
iifname \"net*\" oifname \"tun*\" reject with icmpx admin-prohibited
iifname \"net*\" jump filter_FWD_policy_foobar
iifname \"net*\" jump filter_FWD_internal
iifname \"net*\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar2\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar2\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"net*\" jump filter_FWD_public
iifname \"foobar2\" oifname \"net*\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"foobar2\" jump filter_FWD_public
iifname \"foobar2\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"foobar3\" jump filter_FWD_public
iifname \"foobar2\" oifname \"foobar3\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"tun*\" jump filter_FWD_public
iifname \"foobar2\" oifname \"tun*\" reject with icmpx admin-prohibited
iifname \"foobar2\" jump filter_FWD_public
iifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar3\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar3\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar3\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar3\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar3\" oifname \"net*\" jump filter_FWD_public
iifname \"foobar3\" oifname \"net*\" reject with icmpx admin-prohibited
iifname \"foobar3\" oifname \"foobar2\" jump filter_FWD_public
iifname \"foobar3\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar3\" oifname \"foobar3\" jump filter_FWD_public
iifname \"foobar3\" oifname \"foobar3\" reject with icmpx admin-prohibited
iifname \"foobar3\" oifname \"tun*\" jump filter_FWD_public
iifname \"foobar3\" oifname \"tun*\" reject with icmpx admin-prohibited
iifname \"foobar3\" jump filter_FWD_public
iifname \"foobar3\" reject with icmpx admin-prohibited
iifname \"tun*\" oifname \"foobar0\" jump filter_FWD_public
iifname \"tun*\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"tun*\" oifname \"foobar1\" jump filter_FWD_public
iifname \"tun*\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"tun*\" oifname \"net*\" jump filter_FWD_public
iifname \"tun*\" oifname \"net*\" reject with icmpx admin-prohibited
iifname \"tun*\" oifname \"foobar2\" jump filter_FWD_public
iifname \"tun*\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"tun*\" oifname \"foobar3\" jump filter_FWD_public
iifname \"tun*\" oifname \"foobar3\" reject with icmpx admin-prohibited
iifname \"tun*\" oifname \"tun*\" jump filter_FWD_public
iifname \"tun*\" oifname \"tun*\" reject with icmpx admin-prohibited
iifname \"tun*\" jump filter_FWD_public
iifname \"tun*\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar1\" jump filter_FWD_public
oifname \"foobar1\" reject with icmpx admin-prohibited
oifname \"net*\" jump filter_FWD_public
oifname \"net*\" reject with icmpx admin-prohibited
oifname \"foobar2\" jump filter_FWD_public
oifname \"foobar2\" reject with icmpx admin-prohibited
oifname \"foobar3\" jump filter_FWD_public
oifname \"foobar3\" reject with icmpx admin-prohibited
oifname \"tun*\" jump filter_FWD_public
oifname \"tun*\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:202"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"" != x"ignore"; then
            $as_echo "build_policy_split_wildcard.at:319" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/build_policy_split_wildcard.at:319"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_153
#AT_START_154
at_fn_group_banner 154 'gh1011.at:1' \
  "remove entries results in empty" "                " 5
at_xfail=no
(
  $as_echo "154. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh1011.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh1011.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh1011.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh1011.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh1011.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh1011.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh1011.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh1011.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh1011.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh1011.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh1011.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh1011.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh1011.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh1011.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh1011.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh1011.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh1011.at:1"








    { set +x
$as_echo "$at_srcdir/gh1011.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




cat >./empty <<'_ATEOF'
10.10.10.0/24
_ATEOF




    { set +x
$as_echo "$at_srcdir/gh1011.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1011.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entries-from-file ./empty "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entries-from-file ./empty
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh1011.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1011.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh1011.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --add-entry 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --add-entry 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1011.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --remove-entries-from-file ./empty "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --remove-entries-from-file ./empty
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "gh1011.at:15" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh1011.at:15"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_154
#AT_START_155
at_fn_group_banner 155 'rhbz2181406.at:1' \
  "rich rule limit" "                                " 5
at_xfail=no
(
  $as_echo "155. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz2181406.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2181406.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz2181406.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz2181406.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz2181406.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz2181406.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz2181406.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2181406.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz2181406.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz2181406.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz2181406.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2181406.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz2181406.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz2181406.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz2181406.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2181406.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz2181406.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2181406.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz2181406.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz2181406.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz2181406.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz2181406.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz2181406.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=ipv4 source address=10.10.10.10 service name=ssh log limit value=\"2/d\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2181406.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family=ipv4 source address=10.10.10.10 service name=ssh log limit value="2/d"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2181406.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=ipv6 destination address=fc00::10:10:10:10 service name=ssh audit limit value=\"5/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2181406.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family=ipv6 destination address=fc00::10:10:10:10 service name=ssh audit limit value="5/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz2181406.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=ipv4 source address=10.10.10.10 service name=http accept limit value=\"2/d\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2181406.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family=ipv4 source address=10.10.10.10 service name=http accept limit value="2/d"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2181406.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=ipv6 destination address=fc00::10:10:10:10 service name=http accept limit value=\"5/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2181406.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family=ipv6 destination address=fc00::10:10:10:10 service name=http accept limit value="5/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz2181406.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz2181406.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_log {
ip saddr 10.10.10.10 tcp dport 22 limit rate 2/day log
ip6 daddr fc00::10:10:10:10 tcp dport 22 limit rate 5/minute log level audit
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz2181406.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz2181406.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 accept
ip6 daddr fe80::/64 udp dport 546 accept
ip6 daddr fc00::10:10:10:10 tcp dport 22 accept
ip saddr 10.10.10.10 tcp dport 80 limit rate 2/day accept
ip6 daddr fc00::10:10:10:10 tcp dport 80 limit rate 5/minute accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }























        if test x"" != x"ignore"; then
            $as_echo "rhbz2181406.at:49" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz2181406.at:49"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_155
#AT_START_156
at_fn_group_banner 156 'ipset_scale.at:1' \
  "ipset scale" "                                    " 5
at_xfail=no
(
  $as_echo "156. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/ipset_scale.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_scale.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/ipset_scale.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "ipset_scale.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/ipset_scale.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "ipset_scale.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/ipset_scale.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_scale.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "ipset_scale.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ipset_scale.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/ipset_scale.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_scale.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/ipset_scale.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "ipset_scale.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/ipset_scale.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_scale.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/ipset_scale.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_scale.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "ipset_scale.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ipset_scale.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "ipset_scale.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/ipset_scale.at:1"





{ set +x
$as_echo "$at_srcdir/ipset_scale.at:5: touch ./entries"
at_fn_check_prepare_trace "ipset_scale.at:5"
( $at_check_trace; touch ./entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/ipset_scale.at:6: sh -c '
for I in \$(seq 250); do
    for J in \$(seq 250); do
        echo \"10.10.\${I}.\${J}/32\" >> ./entries
    done
done
'"
at_fn_check_prepare_notrace 'a $(...) command substitution' "ipset_scale.at:6"
( $at_check_trace; sh -c '
for I in $(seq 250); do
    for J in $(seq 250); do
        echo "10.10.${I}.${J}/32" >> ./entries
    done
done
'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/ipset_scale.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_scale.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_scale.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entries-from-file ./entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_scale.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entries-from-file ./entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }





ulimit -d $(expr 1024 \* 300)



    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "ipset_scale.at:22" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ipset_scale.at:22"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "ipset_scale.at:22" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/ipset_scale.at:22"





    { set +x
$as_echo "$at_srcdir/ipset_scale.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_scale.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_scale.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_scale.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "ipset_scale.at:25" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/ipset_scale.at:25"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_156
#AT_START_157
at_fn_group_banner 157 'gh1129.at:1' \
  "switch backend to iptables and reload" "          " 5
at_xfail=no
(
  $as_echo "157. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh1129.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1129.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1129.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh1129.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh1129.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1129.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh1129.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh1129.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1129.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh1129.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1129.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1129.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh1129.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh1129.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh1129.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1129.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1129.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh1129.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh1129.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1129.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh1129.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1129.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1129.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh1129.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1129.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1129.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh1129.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh1129.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh1129.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh1129.at:1"




$as_echo "gh1129.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} command -v nft >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh1129.at:1"

{ set +x
$as_echo "$at_srcdir/gh1129.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh1129.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1129.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh1129.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1129.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1129.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1129.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1129.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1129.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1129.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft list table inet firewalld "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1129.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list table inet firewalld
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh1129.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh1129.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft list table inet firewalld_policy_drop "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1129.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list table inet firewalld_policy_drop
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh1129.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





        if test x"" != x"ignore"; then
            $as_echo "gh1129.at:1" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh1129.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_157
#AT_START_158
at_fn_group_banner 158 'gh1146.at:1' \
  "policy with mixed family zone source" "           " 5
at_xfail=no
(
  $as_echo "158. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh1146.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh1146.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh1146.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh1146.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh1146.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh1146.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh1146.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh1146.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh1146.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh1146.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh1146.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh1146.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh1146.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh1146.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh1146.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh1146.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh1146.at:1"








    { set +x
$as_echo "$at_srcdir/gh1146.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface dummy1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1146.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-source 10.11.11.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-source 10.11.11.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh1146.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-source fc00:1111:1111:1111::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-source fc00:1111:1111:1111::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh1146.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-interface dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-interface dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1146.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-source 10.22.22.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-source 10.22.22.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh1146.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-source fc00:2222:2222:2222::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-source fc00:2222:2222:2222::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh1146.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1146.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1146.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh1146.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1146.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh1146.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh1146.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
ip saddr 10.11.11.0/24 ip daddr 10.11.11.0/24 jump filter_FWD_internal
ip saddr 10.11.11.0/24 ip daddr 10.11.11.0/24 reject with icmpx admin-prohibited
ip saddr 10.11.11.0/24 ip daddr 10.22.22.0/24 jump filter_FWD_policy_foobar
ip saddr 10.11.11.0/24 ip daddr 10.22.22.0/24 jump filter_FWD_internal
ip saddr 10.11.11.0/24 ip daddr 10.22.22.0/24 reject with icmpx admin-prohibited
oifname \"dummy1\" ip saddr 10.11.11.0/24 jump filter_FWD_internal
oifname \"dummy1\" ip saddr 10.11.11.0/24 reject with icmpx admin-prohibited
oifname \"dummy2\" ip saddr 10.11.11.0/24 jump filter_FWD_policy_foobar
oifname \"dummy2\" ip saddr 10.11.11.0/24 jump filter_FWD_internal
oifname \"dummy2\" ip saddr 10.11.11.0/24 reject with icmpx admin-prohibited
ip saddr 10.11.11.0/24 jump filter_FWD_policy_foobar
ip saddr 10.11.11.0/24 jump filter_FWD_internal
ip saddr 10.11.11.0/24 reject with icmpx admin-prohibited
ip6 saddr fc00:1111:1111:1111::/64 ip6 daddr fc00:1111:1111:1111::/64 jump filter_FWD_internal
ip6 saddr fc00:1111:1111:1111::/64 ip6 daddr fc00:1111:1111:1111::/64 reject with icmpx admin-prohibited
ip6 saddr fc00:1111:1111:1111::/64 ip6 daddr fc00:2222:2222:2222::/64 jump filter_FWD_policy_foobar
ip6 saddr fc00:1111:1111:1111::/64 ip6 daddr fc00:2222:2222:2222::/64 jump filter_FWD_internal
ip6 saddr fc00:1111:1111:1111::/64 ip6 daddr fc00:2222:2222:2222::/64 reject with icmpx admin-prohibited
oifname \"dummy1\" ip6 saddr fc00:1111:1111:1111::/64 jump filter_FWD_internal
oifname \"dummy1\" ip6 saddr fc00:1111:1111:1111::/64 reject with icmpx admin-prohibited
oifname \"dummy2\" ip6 saddr fc00:1111:1111:1111::/64 jump filter_FWD_policy_foobar
oifname \"dummy2\" ip6 saddr fc00:1111:1111:1111::/64 jump filter_FWD_internal
oifname \"dummy2\" ip6 saddr fc00:1111:1111:1111::/64 reject with icmpx admin-prohibited
ip6 saddr fc00:1111:1111:1111::/64 jump filter_FWD_policy_foobar
ip6 saddr fc00:1111:1111:1111::/64 jump filter_FWD_internal
ip6 saddr fc00:1111:1111:1111::/64 reject with icmpx admin-prohibited
ip saddr 10.22.22.0/24 ip daddr 10.11.11.0/24 jump filter_FWD_public
ip saddr 10.22.22.0/24 ip daddr 10.11.11.0/24 reject with icmpx admin-prohibited
ip saddr 10.22.22.0/24 ip daddr 10.22.22.0/24 jump filter_FWD_public
ip saddr 10.22.22.0/24 ip daddr 10.22.22.0/24 reject with icmpx admin-prohibited
oifname \"dummy1\" ip saddr 10.22.22.0/24 jump filter_FWD_public
oifname \"dummy1\" ip saddr 10.22.22.0/24 reject with icmpx admin-prohibited
oifname \"dummy2\" ip saddr 10.22.22.0/24 jump filter_FWD_public
oifname \"dummy2\" ip saddr 10.22.22.0/24 reject with icmpx admin-prohibited
ip saddr 10.22.22.0/24 jump filter_FWD_public
ip saddr 10.22.22.0/24 reject with icmpx admin-prohibited
ip6 saddr fc00:2222:2222:2222::/64 ip6 daddr fc00:1111:1111:1111::/64 jump filter_FWD_public
ip6 saddr fc00:2222:2222:2222::/64 ip6 daddr fc00:1111:1111:1111::/64 reject with icmpx admin-prohibited
ip6 saddr fc00:2222:2222:2222::/64 ip6 daddr fc00:2222:2222:2222::/64 jump filter_FWD_public
ip6 saddr fc00:2222:2222:2222::/64 ip6 daddr fc00:2222:2222:2222::/64 reject with icmpx admin-prohibited
oifname \"dummy1\" ip6 saddr fc00:2222:2222:2222::/64 jump filter_FWD_public
oifname \"dummy1\" ip6 saddr fc00:2222:2222:2222::/64 reject with icmpx admin-prohibited
oifname \"dummy2\" ip6 saddr fc00:2222:2222:2222::/64 jump filter_FWD_public
oifname \"dummy2\" ip6 saddr fc00:2222:2222:2222::/64 reject with icmpx admin-prohibited
ip6 saddr fc00:2222:2222:2222::/64 jump filter_FWD_public
ip6 saddr fc00:2222:2222:2222::/64 reject with icmpx admin-prohibited
iifname \"dummy1\" ip daddr 10.11.11.0/24 jump filter_FWD_internal
iifname \"dummy1\" ip daddr 10.11.11.0/24 reject with icmpx admin-prohibited
iifname \"dummy1\" ip6 daddr fc00:1111:1111:1111::/64 jump filter_FWD_internal
iifname \"dummy1\" ip6 daddr fc00:1111:1111:1111::/64 reject with icmpx admin-prohibited
iifname \"dummy1\" ip daddr 10.22.22.0/24 jump filter_FWD_policy_foobar
iifname \"dummy1\" ip daddr 10.22.22.0/24 jump filter_FWD_internal
iifname \"dummy1\" ip daddr 10.22.22.0/24 reject with icmpx admin-prohibited
iifname \"dummy1\" ip6 daddr fc00:2222:2222:2222::/64 jump filter_FWD_policy_foobar
iifname \"dummy1\" ip6 daddr fc00:2222:2222:2222::/64 jump filter_FWD_internal
iifname \"dummy1\" ip6 daddr fc00:2222:2222:2222::/64 reject with icmpx admin-prohibited
iifname \"dummy1\" oifname \"dummy1\" jump filter_FWD_internal
iifname \"dummy1\" oifname \"dummy1\" reject with icmpx admin-prohibited
iifname \"dummy1\" oifname \"dummy2\" jump filter_FWD_policy_foobar
iifname \"dummy1\" oifname \"dummy2\" jump filter_FWD_internal
iifname \"dummy1\" oifname \"dummy2\" reject with icmpx admin-prohibited
iifname \"dummy1\" jump filter_FWD_policy_foobar
iifname \"dummy1\" jump filter_FWD_internal
iifname \"dummy1\" reject with icmpx admin-prohibited
iifname \"dummy2\" ip daddr 10.11.11.0/24 jump filter_FWD_public
iifname \"dummy2\" ip daddr 10.11.11.0/24 reject with icmpx admin-prohibited
iifname \"dummy2\" ip6 daddr fc00:1111:1111:1111::/64 jump filter_FWD_public
iifname \"dummy2\" ip6 daddr fc00:1111:1111:1111::/64 reject with icmpx admin-prohibited
iifname \"dummy2\" ip daddr 10.22.22.0/24 jump filter_FWD_public
iifname \"dummy2\" ip daddr 10.22.22.0/24 reject with icmpx admin-prohibited
iifname \"dummy2\" ip6 daddr fc00:2222:2222:2222::/64 jump filter_FWD_public
iifname \"dummy2\" ip6 daddr fc00:2222:2222:2222::/64 reject with icmpx admin-prohibited
iifname \"dummy2\" oifname \"dummy1\" jump filter_FWD_public
iifname \"dummy2\" oifname \"dummy1\" reject with icmpx admin-prohibited
iifname \"dummy2\" oifname \"dummy2\" jump filter_FWD_public
iifname \"dummy2\" oifname \"dummy2\" reject with icmpx admin-prohibited
iifname \"dummy2\" jump filter_FWD_public
iifname \"dummy2\" reject with icmpx admin-prohibited
ip daddr 10.11.11.0/24 jump filter_FWD_public
ip daddr 10.11.11.0/24 reject with icmpx admin-prohibited
ip6 daddr fc00:1111:1111:1111::/64 jump filter_FWD_public
ip6 daddr fc00:1111:1111:1111::/64 reject with icmpx admin-prohibited
ip daddr 10.22.22.0/24 jump filter_FWD_public
ip daddr 10.22.22.0/24 reject with icmpx admin-prohibited
ip6 daddr fc00:2222:2222:2222::/64 jump filter_FWD_public
ip6 daddr fc00:2222:2222:2222::/64 reject with icmpx admin-prohibited
oifname \"dummy1\" jump filter_FWD_public
oifname \"dummy1\" reject with icmpx admin-prohibited
oifname \"dummy2\" jump filter_FWD_public
oifname \"dummy2\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }
















        if test x"" != x"ignore"; then
            $as_echo "gh1146.at:242" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh1146.at:242"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_158
#AT_START_159
at_fn_group_banner 159 'gh1152.at:1' \
  "list-all identical content" "                     " 5
at_xfail=no
(
  $as_echo "159. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh1152.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh1152.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh1152.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh1152.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh1152.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh1152.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh1152.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh1152.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh1152.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh1152.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh1152.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh1152.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh1152.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh1152.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh1152.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh1152.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh1152.at:1"








    { set +x
$as_echo "$at_srcdir/gh1152.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone block --add-interface dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone block --add-interface dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh1152.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-all-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh1152.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-all-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "block
target: %%REJECT%%
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces: dummy0
sources:
services:
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
dmz
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
drop
target: DROP
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services:
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
external
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
forward: yes
masquerade: yes
forward-ports:
source-ports:
icmp-blocks:
rich rules:
home
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client mdns samba-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
internal
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client mdns samba-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
public (default)
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
trusted
target: ACCEPT
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services:
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
work
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }





    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/gh1152.at:152: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --list-all-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }"
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh1152.at:152"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --list-all-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "block
target: %%REJECT%%
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces: dummy0
sources:
services:
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
dmz
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
drop
target: DROP
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services:
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
external
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
forward: yes
masquerade: yes
forward-ports:
source-ports:
icmp-blocks:
rich rules:
home
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client mdns samba-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
internal
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client mdns samba-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
public (default)
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
trusted
target: ACCEPT
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services:
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
work
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:152"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh1152.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1152.at:300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-service http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1152.at:301:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-all-policies | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh1152.at:301"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-all-policies | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
foobar
priority: -1
target: CONTINUE
ingress-zones:
egress-zones:
services: http
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:301"
$at_failed && at_fn_log_failure
$at_traceon; }





    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/gh1152.at:333: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --list-all-policies | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }"
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh1152.at:333"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --list-all-policies | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
foobar
priority: -1
target: CONTINUE
ingress-zones:
egress-zones:
services: http
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:333"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1152.at:366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1152.at:366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:366"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh1152.at:367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh1152.at:367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "block (active)
target: %%REJECT%%
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces: dummy0
sources:
services:
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
dmz
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
drop
target: DROP
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services:
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
external
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
forward: yes
masquerade: yes
forward-ports:
source-ports:
icmp-blocks:
rich rules:
home
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client mdns samba-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
internal
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client mdns samba-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
public (default, active)
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
trusted
target: ACCEPT
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services:
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
work
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1152.at:513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all-policies | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh1152.at:513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all-policies | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
foobar
priority: -1
target: CONTINUE
ingress-zones:
egress-zones:
services: http
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:513"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh1152.at:546:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:546"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "block
  interfaces: dummy0
public (default)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:546"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh1152.at:552:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:552"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:552"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "gh1152.at:558" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh1152.at:558"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_159
#AT_START_160
at_fn_group_banner 160 'rhbz2222044.at:1' \
  "duplicate rules after restart" "                  " 5
at_xfail=no
(
  $as_echo "160. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz2222044.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz2222044.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz2222044.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz2222044.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz2222044.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz2222044.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz2222044.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz2222044.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz2222044.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz2222044.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz2222044.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz2222044.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz2222044.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz2222044.at:1"




$as_echo "rhbz2222044.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} command -v wc >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz2222044.at:3"




{ set +x
$as_echo "$at_srcdir/rhbz2222044.at:20: sed -i 's/^CleanupOnExit.*/CleanupOnExit=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz2222044.at:20"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft list table inet firewalld | wc -l "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list table inet firewalld | wc -l
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "331
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }





    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz2222044.at:24" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz2222044.at:24"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz2222044.at:24" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz2222044.at:24"





    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft list table inet firewalld | wc -l "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list table inet firewalld | wc -l
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "331
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft list table inet firewalld | wc -l "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list table inet firewalld | wc -l
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "331
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft list table inet firewalld | wc -l "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list table inet firewalld | wc -l
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "331
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/rhbz2222044.at:32: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz2222044.at:32"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft list table inet firewalld | wc -l "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list table inet firewalld | wc -l
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "331
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }





    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz2222044.at:36" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz2222044.at:36"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz2222044.at:36" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz2222044.at:36"





    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft list table inet firewalld | wc -l "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list table inet firewalld | wc -l
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "331
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft list table inet firewalld | wc -l "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list table inet firewalld | wc -l
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "331
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft list table inet firewalld | wc -l "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list table inet firewalld | wc -l
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "331
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz2222044.at:44" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz2222044.at:44"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_160
#AT_START_161
at_fn_group_banner 161 'python.at:3' \
  "firewalld_test.py" "                              " 6
at_xfail=no
(
  $as_echo "161. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:3: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:3"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:3: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/python.at:3: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/python.at:3: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:3"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "python.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:3"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/python.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/python.at:3: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/python.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/python.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:3"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:3" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:3"





    { set +x
$as_echo "$at_srcdir/python.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$PYTHON \$(dirname \${at_myself})/python/firewalld_test.py "
at_fn_check_prepare_notrace 'a $(...) command substitution' "python.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $PYTHON $(dirname ${at_myself})/python/firewalld_test.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"ignore" != x"ignore"; then
            $as_echo "python.at:6" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/python.at:6"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_161
#AT_START_162
at_fn_group_banner 162 'python.at:8' \
  "firewalld_config.py" "                            " 6
at_xfail=no
(
  $as_echo "162. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:8: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:8"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:8: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/python.at:8: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/python.at:8: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:8"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "python.at:8" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:8"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/python.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/python.at:8: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/python.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/python.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:8" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:8"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:8" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:8"





    { set +x
$as_echo "$at_srcdir/python.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$PYTHON \$(dirname \${at_myself})/python/firewalld_config.py "
at_fn_check_prepare_notrace 'a $(...) command substitution' "python.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $PYTHON $(dirname ${at_myself})/python/firewalld_config.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"ignore" != x"ignore"; then
            $as_echo "python.at:11" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/python.at:11"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_162
#AT_START_163
at_fn_group_banner 163 'python.at:13' \
  "firewalld_rich.py" "                              " 6
at_xfail=no
(
  $as_echo "163. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:13: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:13"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:13: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/python.at:13: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/python.at:13: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:13"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "python.at:13" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:13"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/python.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/python.at:13: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/python.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/python.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:13" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:13"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:13" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:13"





    { set +x
$as_echo "$at_srcdir/python.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$PYTHON \$(dirname \${at_myself})/python/firewalld_rich.py "
at_fn_check_prepare_notrace 'a $(...) command substitution' "python.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $PYTHON $(dirname ${at_myself})/python/firewalld_rich.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"ignore" != x"ignore"; then
            $as_echo "python.at:16" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/python.at:16"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_163
#AT_START_164
at_fn_group_banner 164 'python.at:18' \
  "firewalld_direct.py" "                            " 6
at_xfail=no
(
  $as_echo "164. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:18: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:18"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:18: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/python.at:18: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/python.at:18: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:18"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "python.at:18" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:18"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/python.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/python.at:18: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/python.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/python.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:18" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:18"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:18" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:18"






        $as_echo "python.at:20" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/python.at:20"



    { set +x
$as_echo "$at_srcdir/python.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$PYTHON \$(dirname \${at_myself})/python/firewalld_direct.py "
at_fn_check_prepare_notrace 'a $(...) command substitution' "python.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $PYTHON $(dirname ${at_myself})/python/firewalld_direct.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"ignore" != x"ignore"; then
            $as_echo "python.at:22" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/python.at:22"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_164
#AT_START_165
at_fn_group_banner 165 'rfc3964_ipv4.at:1' \
  "RFC3964_IPv4" "                                   " 7
at_xfail=no
(
  $as_echo "165. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"





{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:4: sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:4"
( $at_check_trace; sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:5: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:5"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
ct state invalid log prefix \"STATE_INVALID_DROP: \"
ct state invalid drop
ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } log prefix \"RFC3964_IPv4_REJECT: \" reject with icmpv6 addr-unreachable
jump filter_FORWARD_POLICIES
log prefix \"FINAL_REJECT: \"
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT {
ct state established,related accept
oifname \"lo\" accept
ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } log prefix \"RFC3964_IPv4_REJECT: \" reject with icmpv6 addr-unreachable
jump filter_OUTPUT_POLICIES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }
















{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:72: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:72"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
ct state invalid log prefix \"STATE_INVALID_DROP: \"
ct state invalid drop
jump filter_FORWARD_POLICIES
log prefix \"FINAL_REJECT: \"
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT {
ct state established,related accept
oifname \"lo\" accept
jump filter_OUTPUT_POLICIES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }



















        if test x"" != x"ignore"; then
            $as_echo "rfc3964_ipv4.at:117" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:117"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_165
#AT_START_166
at_fn_group_banner 166 'service_include.at:1' \
  "service include" "                                " 7
at_xfail=no
(
  $as_echo "166. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/service_include.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/service_include.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "service_include.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_include.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/service_include.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/service_include.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/service_include.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/service_include.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "service_include.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_include.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "service_include.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:1"





{ set +x
$as_echo "$at_srcdir/service_include.at:4: mkdir -p ./services"
at_fn_check_prepare_trace "service_include.at:4"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:5: cat <<HERE > ./services/my-service-with-include.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol=\"tcp\" port=\"12345\"/>
  <include service=\"ssdp\"/>
  <include service=\"mdns\"/>
  <include service=\"recursive-service\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:5"
( $at_check_trace; cat <<HERE > ./services/my-service-with-include.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol="tcp" port="12345"/>
  <include service="ssdp"/>
  <include service="mdns"/>
  <include service="recursive-service"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:17: cat <<HERE > ./services/recursive-service.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service=\"my-service-with-include\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:17"
( $at_check_trace; cat <<HERE > ./services/recursive-service.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service="my-service-with-include"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/service_include.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/service_include.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=drop --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=drop --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=drop --add-service=my-service-with-include "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=drop --add-service=my-service-with-include
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=drop --list-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=drop --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=drop --add-service=recursive-service "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=drop --add-service=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=drop --remove-service=recursive-service "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=drop --remove-service=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd    --zone=drop --add-rich-rule='rule service name=recursive-service log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd    --zone=drop --add-rich-rule='rule service name=recursive-service log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=drop --list-rich-rules "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=drop --list-rich-rules
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "rule service name=\"recursive-service\" log
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/service_include.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_drop_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_drop_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_drop_allow {
ip daddr 239.255.255.250 udp dport 1900 accept
ip6 daddr ff02::c udp dport 1900 accept
ip daddr 224.0.0.251 udp dport 5353 accept
ip6 daddr ff02::fb udp dport 5353 accept
tcp dport 12345 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/service_include.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_drop_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_drop_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_drop_log {
ip daddr 239.255.255.250 udp dport 1900 log
ip6 daddr ff02::c udp dport 1900 log
ip daddr 224.0.0.251 udp dport 5353 log
ip6 daddr ff02::fb udp dport 5353 log
tcp dport 12345 log
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }






















    { set +x
$as_echo "$at_srcdir/service_include.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=recursive-service "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --add-include=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/service_include.at:89: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:89"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/service_include.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --remove-include=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/service_include.at:92: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:92"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/service_include.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --get-includes "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:118: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service" "service_include.at:118"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:119: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh" "service_include.at:119"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:120: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:120"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:121: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:121"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:121"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:122: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh" "service_include.at:122"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:123: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:123"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:124: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:124"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:125: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes" "service_include.at:125"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:128: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }"
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:128"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:128"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/service_include.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --add-include=does-not-exist "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --add-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/service_include.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }





    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:141: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --add-include=does-not-exist"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --add-include=does-not-exist" "service_include.at:141"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --add-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/service_include.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }





        if test x"-e '/ERROR: INVALID_SERVICE:/d'" != x"ignore"; then
            $as_echo "service_include.at:143" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_SERVICE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:143"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_166
#AT_START_167
at_fn_group_banner 167 'helpers_custom.at:1' \
  "customer helpers" "                               " 7
at_xfail=no
(
  $as_echo "167. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "helpers_custom.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/helpers_custom.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/helpers_custom.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/helpers_custom.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "helpers_custom.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "helpers_custom.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:1"








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-helper=\"ftptest\" --module=\"nf_conntrack_ftp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-helper="ftptest" --module="nf_conntrack_ftp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --helper=ftptest --add-port=\"2121/tcp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --helper=ftptest --add-port="2121/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-service=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-service="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --query-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --query-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-port=\"2121/tcp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-port="2121/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules: ftptest
destination:
includes:
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules: ftptest
destination:
includes:
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=ftptest "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=ftptest
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/helpers_custom.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 accept
ip6 daddr fe80::/64 udp dport 546 accept
tcp dport 2121 ct helper set \"helper-ftptest-tcp\"
tcp dport 2121 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }






















    { set +x
$as_echo "$at_srcdir/helpers_custom.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --remove-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --remove-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --query-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --query-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/helpers_custom.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-helper=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-helper="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules:
destination:
includes:
helpers: ftptest
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules:
destination:
includes:
helpers: ftptest
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=ftptest "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=ftptest
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/helpers_custom.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 accept
ip6 daddr fe80::/64 udp dport 546 accept
tcp dport 2121 ct helper set \"helper-ftptest-tcp\"
tcp dport 2121 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }






















    { set +x
$as_echo "$at_srcdir/helpers_custom.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --remove-helper=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --remove-helper="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-helper=\"ftp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-helper="ftp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-port=\"21/tcp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-port="21/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/helpers_custom.at:122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=ftptest "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=ftptest
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/helpers_custom.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 accept
ip6 daddr fe80::/64 udp dport 546 accept
tcp dport 21 ct helper set \"helper-ftp-tcp\"
tcp dport 2121 ct helper set \"helper-ftptest-tcp\"
tcp dport 2121 accept
tcp dport 21 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }





















        if test x"" != x"ignore"; then
            $as_echo "helpers_custom.at:156" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:156"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_167
#AT_START_168
at_fn_group_banner 168 'policy.at:5' \
  "policy - xml" "                                   " 7
at_xfail=no
(
  $as_echo "168. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:5: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:5"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:5: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:5"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:5: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:5"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:5"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:5" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:5"





{ set +x
$as_echo "$at_srcdir/policy.at:8: mkdir -p ./policies"
at_fn_check_prepare_trace "policy.at:8"
( $at_check_trace; mkdir -p ./policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }


cat >./policies/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<policy target="CONTINUE" priority="-123">
<short>foobar</short>
<description>foobar policy</description>
<ingress-zone name="public" />
<egress-zone name="ANY" />
<service name="ssh" />
<service name="https" />
<port port="1234" protocol="tcp" />
<icmp-block name="echo-request" />
<masquerade />
<forward-port port="1234" protocol="tcp" to-port="4321" to-addr="10.10.10.1" />
<source-port port="1234" protocol="udp" />
<protocol value="ipv6-icmp" />
<rule family="ipv4">
    <source address="10.10.10.0/24" />
    <destination address="192.168.10.0/24" />
    <service name="ssh" />
    <accept>
        <limit value="5/m" />
    </accept>
</rule>
<rule>
    <port port="1234" protocol="tcp" />
    <reject />
</rule>
<rule family="ipv4">
    <source address="10.10.10.0/24" />
    <icmp-block name="echo-request" />
</rule>
<rule>
    <icmp-type name="echo-reply" />
    <drop />
</rule>
<rule family="ipv4">
    <forward-port port="1234" protocol="tcp" to-port="4321" to-addr="10.10.10.1" />
</rule>
<rule>
    <source-port port="1234" protocol="udp" />
    <log prefix="LOG: " level="warning" />
</rule>
<rule>
    <source-port port="1234" protocol="tcp" />
    <nflog group="1" prefix="NFLOG: " queue-size="10">
        <limit value="5/m" />
    </nflog>
</rule>
<rule family="ipv6">
    <protocol value="ipv6-icmp" />
    <audit />
    <accept />
</rule>
<rule family="ipv4">
    <destination address="192.168.10.0/24" />
    <mark set="123" />
</rule>
</policy>
_ATEOF




    { set +x
$as_echo "$at_srcdir/policy.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "policy.at:73" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:73"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_168
#AT_START_169
at_fn_group_banner 169 'policy.at:79' \
  "policy - create" "                                " 7
at_xfail=no
(
  $as_echo "169. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:79: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:79"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:79: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:79"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:79: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:79"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:79: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:79"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:79" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:79"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:79:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:79"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:79: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:79"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:79:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:79"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:79:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:79"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:79" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:79"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:79" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:79"








    { set +x
$as_echo "$at_srcdir/policy.at:83:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy worldToHost "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:83"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy worldToHost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy hostToWorld "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy hostToWorld
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:85:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy zoneToZone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:85"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy zoneToZone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 hostToWorld worldToHost zoneToZone
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 hostToWorld worldToHost zoneToZone
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:94" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:94"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_169
#AT_START_170
at_fn_group_banner 170 'policy.at:96' \
  "policy - name" "                                  " 7
at_xfail=no
(
  $as_echo "170. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:96: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:96"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:96: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:96"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:96: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:96"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:96: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:96"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:96" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:96"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:96: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:96"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:96" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:96"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:96" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:96"








    { set +x
$as_echo "$at_srcdir/policy.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy 123456789012345678 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy 123456789012345678
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy 1234567890123456789 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy 1234567890123456789
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 116 $at_status "$at_srcdir/policy.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/policy.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone allow-host-ipv6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone allow-host-ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/policy.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_NAME:/d' -e '/ERROR: NAME_CONFLICT:/d'" != x"ignore"; then
            $as_echo "policy.at:107" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_NAME:/d' -e '/ERROR: NAME_CONFLICT:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:107"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_170
#AT_START_171
at_fn_group_banner 171 'policy.at:109' \
  "policy - list" "                                  " 7
at_xfail=no
(
  $as_echo "171. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:109: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:109"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:109: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:109"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:109: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:109"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:109: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:109"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:109" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:109"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:109: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:109"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:109" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:109"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:109" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:109"








    { set +x
$as_echo "$at_srcdir/policy.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-policy allow-host-ipv6 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-policy allow-host-ipv6 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-policy allow-host-ipv6 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-policy allow-host-ipv6 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:131"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:151:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all-policies | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:151"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all-policies | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:151"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:170:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-all-policies | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:170"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-all-policies | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:190:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:190"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:190"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:209:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:209"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:209"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:229" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:229"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_171
#AT_START_172
at_fn_group_banner 172 'policy.at:231' \
  "policy - options" "                               " 7
at_xfail=no
(
  $as_echo "172. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:231: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:231"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:231: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:231"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:231: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:231"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:231: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:231"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:231" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:231"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:231:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:231"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:231: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:231"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:231:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:231"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:231:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:231"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:231" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:231"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:231" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:231"








    { set +x
$as_echo "$at_srcdir/policy.at:235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:235"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:240:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:240"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:240"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:241:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:241"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:241"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:242:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:242"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:244:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:244"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-interfaces "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-interfaces "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:249"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:250:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:250"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:250"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:251"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:259:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:259"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:259"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:260:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:260"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:260"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:261:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:261"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:261"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:262:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:262"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:262"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:263:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:263"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:263"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:264:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:264"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:264"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-egress-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-egress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:271:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:271"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:271"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:272:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:272"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:272"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-egress-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-egress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:274"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:275"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:276:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:276"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:278:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-ingress-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:278"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-ingress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:281:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:281"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:281"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-ingress-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-ingress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:284" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:284"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_172
#AT_START_173
at_fn_group_banner 173 'policy.at:286' \
  "policy - priority" "                              " 7
at_xfail=no
(
  $as_echo "173. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:286: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:286"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:286: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:286"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:286: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:286"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:286: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:286"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:286" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:286"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:286: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:286"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:286" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:286"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:286" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:286"








    { set +x
$as_echo "$at_srcdir/policy.at:289:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-interface dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:289"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-interface dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:289"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy worldToHost "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy worldToHost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:293"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:294:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:294"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --get-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-1
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:296"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/policy.at:300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
iifname \"dummy0\" jump filter_IN_policy_allow-host-ipv6
iifname \"dummy0\" jump filter_IN_policy_worldToHost
iifname \"dummy0\" jump filter_IN_public
iifname \"dummy0\" reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_policy_worldToHost
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority 1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority 1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:336"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/policy.at:338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
iifname \"dummy0\" jump filter_IN_policy_allow-host-ipv6
iifname \"dummy0\" jump filter_IN_public
iifname \"dummy0\" jump filter_IN_policy_worldToHost
iifname \"dummy0\" reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
jump filter_IN_policy_worldToHost
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:338"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:374:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy first "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:374"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy first
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:374"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy first --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy first --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:376:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy first --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:376"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy first --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:377:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy second "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:377"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy second
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:377"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:378:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy second --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:378"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy second --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:378"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy second --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy second --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:380:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy third "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:380"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy third
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:380"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:381:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy third --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:381"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy third --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:381"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:382:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy third --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:382"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy third --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:382"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:383:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy fourth "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:383"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy fourth
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:383"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:384:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fourth --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:384"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fourth --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:384"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:385:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fourth --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:385"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fourth --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:385"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:386:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy fifth "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:386"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy fifth
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:386"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:387:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fifth --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:387"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fifth --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:387"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:388:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fifth --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:388"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fifth --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:388"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:390:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fourth --set-priority -100 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:390"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fourth --set-priority -100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:390"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:391:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy second --set-priority -5000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:391"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy second --set-priority -5000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:391"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:392:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy first --set-priority -10000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:392"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy first --set-priority -10000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:392"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:393:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy third --set-priority -1000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:393"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy third --set-priority -1000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:393"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:394:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fifth --set-priority -10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:394"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fifth --set-priority -10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:395:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:395"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:395"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:395:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:395"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:395"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/policy.at:396:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:396"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
iifname \"dummy0\" jump filter_IN_policy_allow-host-ipv6
iifname \"dummy0\" jump filter_IN_policy_first
iifname \"dummy0\" jump filter_IN_policy_second
iifname \"dummy0\" jump filter_IN_policy_third
iifname \"dummy0\" jump filter_IN_policy_fourth
iifname \"dummy0\" jump filter_IN_policy_fifth
iifname \"dummy0\" jump filter_IN_public
iifname \"dummy0\" jump filter_IN_policy_worldToHost
iifname \"dummy0\" reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_policy_first
jump filter_IN_policy_second
jump filter_IN_policy_third
jump filter_IN_policy_fourth
jump filter_IN_policy_fifth
jump filter_IN_public
jump filter_IN_policy_worldToHost
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:396"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:462:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority 0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:462"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/policy.at:462"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/policy.at:463:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -32769 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:463"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -32769
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/policy.at:463"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:464:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:464"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:464"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:465:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority  32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:465"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority  32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/policy.at:465"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:466:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority  32767 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:466"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority  32767
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:466"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_PRIORITY/d'" != x"ignore"; then
            $as_echo "policy.at:468" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_PRIORITY/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:468"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_173
#AT_START_174
at_fn_group_banner 174 'policy.at:470' \
  "policy - zones" "                                 " 7
at_xfail=no
(
  $as_echo "174. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:470: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:470"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:470: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:470"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:470: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:470"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:470: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:470"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:470" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:470"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:470:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:470"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:470: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:470"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:470:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:470"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:470:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:470"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:470" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:470"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:470" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:470"








    { set +x
$as_echo "$at_srcdir/policy.at:473:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:473"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:473"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:474:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:474"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:476:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:476"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:476"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:477:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:477"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:477"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:478:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:478"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:478"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:478:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:478"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:478"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:481:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:481"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:481"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:482:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:482"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:482"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:483:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:483"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:483"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:484:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:484"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:484"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:485:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:485"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:485"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:486:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:486"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:486"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:487:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:487"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:487"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:488:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:488"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:488"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:489:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:489"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:489"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:490:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:490"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:490"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:491:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:491"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:491"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:492:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:492"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:493:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:493"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:493"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:494:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:494"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:494"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:495:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:495"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:495"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:496:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:496"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:496"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:497:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:497"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:497"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:498:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:498"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:499:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:499"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:499"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:500:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:500"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:500"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:501:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:501"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:502:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:502"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:502"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:503:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:503"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:503"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:504:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:504"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:504"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:505:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:505"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:505"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:506:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:506"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:506"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:507:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:507"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:507"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:508:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:508"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:508"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:509:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:509"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:509"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:510:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:510"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:510"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:511:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:511"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:511"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:512:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:512"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:512"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:513"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:514:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:514"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:514"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:515:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:515"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:515"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:516:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:516"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:516"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:517"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:518:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:518"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:518"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:519:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:519"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:519"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:520:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:520"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:520"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:523:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:523"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:523"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:524:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:524"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:524"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:525:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:525"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:525"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:526:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:526"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:526"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:527:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:527"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:527"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:528:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:528"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:528"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:529:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:529"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:529"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:530:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:530"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:530"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:531:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:531"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:531"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:532:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:532"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:532"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:533:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:533"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:534:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:534"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:534"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:535:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:535"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:535"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:536:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:536"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:536"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:537:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:537"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:537"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:538:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:538"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:538"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:539:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:539"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:539"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:540:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:540"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:540"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:541:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:541"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:541"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:542:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:542"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:542"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:543:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:543"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:543"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:544:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:544"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:544"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:545:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:545"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:545"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:546:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:546"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:546"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:547"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:548:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:548"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:548"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:549:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:549"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:549"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:550:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:550"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:550"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:553:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:553"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:553"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:554:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:554"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:554"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:555:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:555"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:555"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:556:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:556"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:556"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:557:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:557"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:557"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:558:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:558"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:558"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:559:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:559"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:559"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:560:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:560"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:560"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:561:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:561"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:561"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:562:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:562"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:562"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:563:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:563"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:563"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:564:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:564"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:564"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:567:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:567"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:567"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:568:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:568"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:568"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:569:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:569"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:569"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:570:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:570"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:570"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:571:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:571"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:571"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:572:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:572"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:572"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:573:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:573"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:573"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:574:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:574"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:574"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:575:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:575"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:575"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:576:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:576"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:576"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:577:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:577"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:577"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:578:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:578"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:578"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:581:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:581"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:581"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:582:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:582"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:582"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:583:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:583"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:583"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:584:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:584"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:584"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:585:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:585"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:585"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:586:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:586"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:586"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:589:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"does_not_exist\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:589"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:589"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:590:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"does_not_exist\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:590"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:590"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:591:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"does_not_exist\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:591"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:591"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:592:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"does_not_exist\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:592"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:592"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:597:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:597"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:597"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:598:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:598"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:598"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:598:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:598"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:598"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:599:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:599"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:599"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:604:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:604"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar1\" jump filter_FWD_public
oifname \"foobar1\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:604"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:668:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:668"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:668"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:669"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:669"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:670:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:670"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
foobar
  ingress-zones: public
  egress-zones: internal
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:670"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:678:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:678"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_policy_foobar
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar1\" jump filter_FWD_policy_foobar
oifname \"foobar1\" jump filter_FWD_public
oifname \"foobar1\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:678"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:748:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:748"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:748"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:749:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:749"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:749"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:749:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:749"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:749"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:750:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:750"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:750"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:755:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:755"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar1\" jump filter_FWD_public
oifname \"foobar1\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:755"
$at_failed && at_fn_log_failure
$at_traceon; }















        if test x"-e '/ERROR: INVALID_ZONE:/d'" != x"ignore"; then
            $as_echo "policy.at:820" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ZONE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:820"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_174
#AT_START_175
at_fn_group_banner 175 'policy.at:822' \
  "policy - dispatch" "                              " 7
at_xfail=no
(
  $as_echo "175. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:822: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:822"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:822: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:822"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:822: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:822"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:822: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:822"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:822" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:822"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:822:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:822"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:822: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:822"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:822:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:822"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:822:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:822"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:822" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:822"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:822" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:822"








    { set +x
$as_echo "$at_srcdir/policy.at:825:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:825"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:825"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:826:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:826"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:826"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:828:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:828"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:828"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:829:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:829"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:829"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:830:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:830"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:830"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:830:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:830"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:830"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:832:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:832"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:832"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:851:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:851"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING {
jump nat_PREROUTING_POLICIES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:851"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:868:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:868"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_OUTPUT {
jump nat_OUTPUT_POLICIES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:868"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:884:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:884"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING {
jump nat_POSTROUTING_POLICIES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:884"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:900:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:900"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING {
jump mangle_PREROUTING_POLICIES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:900"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:921:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:921"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
ct state invalid drop
jump filter_INPUT_POLICIES
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:921"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
ct state invalid drop
ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } reject with icmpv6 addr-unreachable
jump filter_FORWARD_POLICIES
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:981:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:981"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT {
ct state established,related accept
oifname \"lo\" accept
ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } reject with icmpv6 addr-unreachable
jump filter_OUTPUT_POLICIES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:981"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:1007:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1007"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1007"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1008:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1008"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1008"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1009:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1009"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
foobar
  ingress-zones: public
  egress-zones: HOST
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1009"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:1018:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1018"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
iifname \"foobar1\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar1\" jump filter_IN_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar0\" jump filter_IN_policy_foobar
iifname \"foobar0\" jump filter_IN_public
iifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_policy_foobar
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1018"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1062:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1062"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES {
oifname \"foobar1\" jump filter_OUT_internal
oifname \"foobar1\" return
oifname \"foobar0\" jump filter_OUT_public
oifname \"foobar0\" return
jump filter_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1062"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1091:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1091"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar1\" jump filter_FWD_public
oifname \"foobar1\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1091"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:1183:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1183"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES {
iifname \"foobar1\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump mangle_PRE_internal
iifname \"foobar1\" return
iifname \"foobar0\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump mangle_PRE_public
iifname \"foobar0\" return
jump mangle_PRE_policy_allow-host-ipv6
jump mangle_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1183"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1221:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1221"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
iifname \"foobar1\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump nat_PRE_internal
iifname \"foobar1\" return
iifname \"foobar0\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump nat_PRE_public
iifname \"foobar0\" return
jump nat_PRE_policy_allow-host-ipv6
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1221"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1259:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1259"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump nat_POST_internal
iifname \"foobar1\" oifname \"foobar1\" return
iifname \"foobar0\" oifname \"foobar1\" jump nat_POST_internal
iifname \"foobar0\" oifname \"foobar1\" return
oifname \"foobar1\" jump nat_POST_internal
oifname \"foobar1\" return
iifname \"foobar1\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar1\" oifname \"foobar0\" return
iifname \"foobar0\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" oifname \"foobar0\" return
oifname \"foobar0\" jump nat_POST_public
oifname \"foobar0\" return
iifname \"foobar1\" jump nat_POST_public
iifname \"foobar1\" return
iifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" return
jump nat_POST_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1259"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_OUTPUT_POLICIES {
oifname \"foobar1\" jump nat_OUT_internal
oifname \"foobar1\" return
oifname \"foobar0\" jump nat_OUT_public
oifname \"foobar0\" return
jump nat_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1300"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:1328:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1328"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1328"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1329:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1329"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1329"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1333:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1333"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1333"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1334:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1334"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1334"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:1336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
iifname \"foobar1\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar1\" jump filter_IN_policy_foobar
iifname \"foobar1\" jump filter_IN_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar0\" jump filter_IN_policy_foobar
iifname \"foobar0\" jump filter_IN_public
iifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_policy_foobar
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1383:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1383"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES {
oifname \"foobar1\" jump filter_OUT_internal
oifname \"foobar1\" return
oifname \"foobar0\" jump filter_OUT_public
oifname \"foobar0\" return
jump filter_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1383"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1412:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1412"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar1\" jump filter_FWD_public
oifname \"foobar1\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1412"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:1506:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1506"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES {
iifname \"foobar1\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump mangle_PRE_policy_foobar
iifname \"foobar1\" jump mangle_PRE_internal
iifname \"foobar1\" return
iifname \"foobar0\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump mangle_PRE_policy_foobar
iifname \"foobar0\" jump mangle_PRE_public
iifname \"foobar0\" return
jump mangle_PRE_policy_allow-host-ipv6
jump mangle_PRE_policy_foobar
jump mangle_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1506"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1553:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1553"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
iifname \"foobar1\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump nat_PRE_policy_foobar
iifname \"foobar1\" jump nat_PRE_internal
iifname \"foobar1\" return
iifname \"foobar0\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump nat_PRE_policy_foobar
iifname \"foobar0\" jump nat_PRE_public
iifname \"foobar0\" return
jump nat_PRE_policy_allow-host-ipv6
jump nat_PRE_policy_foobar
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1553"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1600:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1600"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump nat_POST_internal
iifname \"foobar1\" oifname \"foobar1\" return
iifname \"foobar0\" oifname \"foobar1\" jump nat_POST_internal
iifname \"foobar0\" oifname \"foobar1\" return
oifname \"foobar1\" jump nat_POST_internal
oifname \"foobar1\" return
iifname \"foobar1\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar1\" oifname \"foobar0\" return
iifname \"foobar0\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" oifname \"foobar0\" return
oifname \"foobar0\" jump nat_POST_public
oifname \"foobar0\" return
iifname \"foobar1\" jump nat_POST_public
iifname \"foobar1\" return
iifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" return
jump nat_POST_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1600"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1641:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1641"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_OUTPUT_POLICIES {
oifname \"foobar1\" jump nat_OUT_internal
oifname \"foobar1\" return
oifname \"foobar0\" jump nat_OUT_public
oifname \"foobar0\" return
jump nat_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1641"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:1669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1669"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1670:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1670"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1670"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1674:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1674"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1674"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1675:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1675"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1675"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:1677:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1677"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
iifname \"foobar1\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar1\" jump filter_IN_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar0\" jump filter_IN_public
iifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1677"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1715:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1715"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES {
oifname \"foobar1\" jump filter_OUT_internal
oifname \"foobar1\" return
oifname \"foobar0\" jump filter_OUT_policy_foobar
oifname \"foobar0\" jump filter_OUT_public
oifname \"foobar0\" return
jump filter_OUT_policy_foobar
jump filter_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1715"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1750:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1750"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar1\" jump filter_FWD_public
oifname \"foobar1\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1750"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:1838:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1838"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES {
iifname \"foobar1\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump mangle_PRE_internal
iifname \"foobar1\" return
iifname \"foobar0\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump mangle_PRE_public
iifname \"foobar0\" return
jump mangle_PRE_policy_allow-host-ipv6
jump mangle_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1838"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1876:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1876"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
iifname \"foobar1\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump nat_PRE_internal
iifname \"foobar1\" return
iifname \"foobar0\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump nat_PRE_public
iifname \"foobar0\" return
jump nat_PRE_policy_allow-host-ipv6
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1876"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1914:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1914"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump nat_POST_internal
iifname \"foobar1\" oifname \"foobar1\" return
iifname \"foobar0\" oifname \"foobar1\" jump nat_POST_internal
iifname \"foobar0\" oifname \"foobar1\" return
oifname \"foobar1\" jump nat_POST_internal
oifname \"foobar1\" return
iifname \"foobar1\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar1\" oifname \"foobar0\" return
iifname \"foobar0\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" oifname \"foobar0\" return
oifname \"foobar0\" jump nat_POST_public
oifname \"foobar0\" return
iifname \"foobar1\" jump nat_POST_public
iifname \"foobar1\" return
iifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" return
jump nat_POST_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1914"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1955:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1955"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_OUTPUT_POLICIES {
oifname \"foobar1\" jump nat_OUT_internal
oifname \"foobar1\" return
oifname \"foobar0\" jump nat_OUT_policy_foobar
oifname \"foobar0\" jump nat_OUT_public
oifname \"foobar0\" return
jump nat_OUT_policy_foobar
jump nat_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1955"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:1989:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1989"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1989"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1990:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1990"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1990"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1994:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1994"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1994"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1995:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1995"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1995"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:1997:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1997"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
iifname \"foobar1\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar1\" jump filter_IN_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar0\" jump filter_IN_public
iifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1997"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:2035:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2035"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES {
oifname \"foobar1\" jump filter_OUT_policy_foobar
oifname \"foobar1\" jump filter_OUT_internal
oifname \"foobar1\" return
oifname \"foobar0\" jump filter_OUT_policy_foobar
oifname \"foobar0\" jump filter_OUT_public
oifname \"foobar0\" return
jump filter_OUT_policy_foobar
jump filter_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2035"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:2073:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2073"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar1\" jump filter_FWD_public
oifname \"foobar1\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2073"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:2161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES {
iifname \"foobar1\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump mangle_PRE_internal
iifname \"foobar1\" return
iifname \"foobar0\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump mangle_PRE_public
iifname \"foobar0\" return
jump mangle_PRE_policy_allow-host-ipv6
jump mangle_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2161"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:2199:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2199"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
iifname \"foobar1\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump nat_PRE_internal
iifname \"foobar1\" return
iifname \"foobar0\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump nat_PRE_public
iifname \"foobar0\" return
jump nat_PRE_policy_allow-host-ipv6
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2199"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:2237:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2237"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump nat_POST_internal
iifname \"foobar1\" oifname \"foobar1\" return
iifname \"foobar0\" oifname \"foobar1\" jump nat_POST_internal
iifname \"foobar0\" oifname \"foobar1\" return
oifname \"foobar1\" jump nat_POST_internal
oifname \"foobar1\" return
iifname \"foobar1\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar1\" oifname \"foobar0\" return
iifname \"foobar0\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" oifname \"foobar0\" return
oifname \"foobar0\" jump nat_POST_public
oifname \"foobar0\" return
iifname \"foobar1\" jump nat_POST_public
iifname \"foobar1\" return
iifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" return
jump nat_POST_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2237"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:2278:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2278"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_OUTPUT_POLICIES {
oifname \"foobar1\" jump nat_OUT_policy_foobar
oifname \"foobar1\" jump nat_OUT_internal
oifname \"foobar1\" return
oifname \"foobar0\" jump nat_OUT_policy_foobar
oifname \"foobar0\" jump nat_OUT_public
oifname \"foobar0\" return
jump nat_OUT_policy_foobar
jump nat_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2278"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:2315:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2315"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2315"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2316:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2316"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2316"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:2320:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2320"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2320"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2321:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2321"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2321"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:2323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
iifname \"foobar1\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar1\" jump filter_IN_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar0\" jump filter_IN_public
iifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2323"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:2361:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2361"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES {
oifname \"foobar1\" jump filter_OUT_internal
oifname \"foobar1\" return
oifname \"foobar0\" jump filter_OUT_public
oifname \"foobar0\" return
jump filter_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2361"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:2390:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2390"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_policy_foobar
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_policy_foobar
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_FWD_policy_foobar
iifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_policy_foobar
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_policy_foobar
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_policy_foobar
iifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar1\" jump filter_FWD_policy_foobar
oifname \"foobar1\" jump filter_FWD_public
oifname \"foobar1\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_policy_foobar
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2390"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:2508:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2508"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES {
iifname \"foobar1\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump mangle_PRE_policy_foobar
iifname \"foobar1\" jump mangle_PRE_internal
iifname \"foobar1\" return
iifname \"foobar0\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump mangle_PRE_policy_foobar
iifname \"foobar0\" jump mangle_PRE_public
iifname \"foobar0\" return
jump mangle_PRE_policy_allow-host-ipv6
jump mangle_PRE_policy_foobar
jump mangle_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2508"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:2555:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2555"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
iifname \"foobar1\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump nat_PRE_policy_foobar
iifname \"foobar1\" jump nat_PRE_internal
iifname \"foobar1\" return
iifname \"foobar0\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump nat_PRE_policy_foobar
iifname \"foobar0\" jump nat_PRE_public
iifname \"foobar0\" return
jump nat_PRE_policy_allow-host-ipv6
jump nat_PRE_policy_foobar
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2555"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:2602:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2602"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump nat_POST_policy_foobar
iifname \"foobar1\" oifname \"foobar1\" jump nat_POST_internal
iifname \"foobar1\" oifname \"foobar1\" return
iifname \"foobar0\" oifname \"foobar1\" jump nat_POST_policy_foobar
iifname \"foobar0\" oifname \"foobar1\" jump nat_POST_internal
iifname \"foobar0\" oifname \"foobar1\" return
oifname \"foobar1\" jump nat_POST_policy_foobar
oifname \"foobar1\" jump nat_POST_internal
oifname \"foobar1\" return
iifname \"foobar1\" oifname \"foobar0\" jump nat_POST_policy_foobar
iifname \"foobar1\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar1\" oifname \"foobar0\" return
iifname \"foobar0\" oifname \"foobar0\" jump nat_POST_policy_foobar
iifname \"foobar0\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" oifname \"foobar0\" return
oifname \"foobar0\" jump nat_POST_policy_foobar
oifname \"foobar0\" jump nat_POST_public
oifname \"foobar0\" return
iifname \"foobar1\" jump nat_POST_policy_foobar
iifname \"foobar1\" jump nat_POST_public
iifname \"foobar1\" return
iifname \"foobar0\" jump nat_POST_policy_foobar
iifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" return
jump nat_POST_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2602"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:2657:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2657"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_OUTPUT_POLICIES {
oifname \"foobar1\" jump nat_OUT_internal
oifname \"foobar1\" return
oifname \"foobar0\" jump nat_OUT_public
oifname \"foobar0\" return
jump nat_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2657"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:2685:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2685"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2685"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2686:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2686"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2686"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:2690:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2690"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2690"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2691:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2691"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2691"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:2693:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2693"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
iifname \"foobar1\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar1\" jump filter_IN_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar0\" jump filter_IN_public
iifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2693"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:2731:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2731"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES {
oifname \"foobar1\" jump filter_OUT_internal
oifname \"foobar1\" return
oifname \"foobar0\" jump filter_OUT_public
oifname \"foobar0\" return
jump filter_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2731"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:2760:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2760"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_policy_foobar
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_FWD_policy_foobar
iifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_policy_foobar
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_policy_foobar
iifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar1\" jump filter_FWD_public
oifname \"foobar1\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_policy_foobar
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2760"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:2869:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2869"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES {
iifname \"foobar1\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump mangle_PRE_internal
iifname \"foobar1\" return
iifname \"foobar0\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump mangle_PRE_public
iifname \"foobar0\" return
jump mangle_PRE_policy_allow-host-ipv6
jump mangle_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2869"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:2907:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2907"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
iifname \"foobar1\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump nat_PRE_internal
iifname \"foobar1\" return
iifname \"foobar0\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump nat_PRE_public
iifname \"foobar0\" return
jump nat_PRE_policy_allow-host-ipv6
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2907"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:2945:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2945"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump nat_POST_internal
iifname \"foobar1\" oifname \"foobar1\" return
iifname \"foobar0\" oifname \"foobar1\" jump nat_POST_internal
iifname \"foobar0\" oifname \"foobar1\" return
oifname \"foobar1\" jump nat_POST_internal
oifname \"foobar1\" return
iifname \"foobar1\" oifname \"foobar0\" jump nat_POST_policy_foobar
iifname \"foobar1\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar1\" oifname \"foobar0\" return
iifname \"foobar0\" oifname \"foobar0\" jump nat_POST_policy_foobar
iifname \"foobar0\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" oifname \"foobar0\" return
oifname \"foobar0\" jump nat_POST_policy_foobar
oifname \"foobar0\" jump nat_POST_public
oifname \"foobar0\" return
iifname \"foobar1\" jump nat_POST_policy_foobar
iifname \"foobar1\" jump nat_POST_public
iifname \"foobar1\" return
iifname \"foobar0\" jump nat_POST_policy_foobar
iifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" return
jump nat_POST_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2945"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:2995:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2995"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_OUTPUT_POLICIES {
oifname \"foobar1\" jump nat_OUT_internal
oifname \"foobar1\" return
oifname \"foobar0\" jump nat_OUT_public
oifname \"foobar0\" return
jump nat_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2995"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:3023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3023"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3024"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3025"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:3029:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3029"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3029"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3030"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3031:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3031"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3031"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:3033:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3033"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
ip saddr 10.10.10.0/24 jump filter_IN_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 jump filter_IN_internal
ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar0\" jump filter_IN_public
iifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3033"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:3068:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3068"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES {
ip daddr 10.10.10.0/24 jump filter_OUT_internal
ip daddr 10.10.10.0/24 return
oifname \"foobar0\" jump filter_OUT_public
oifname \"foobar0\" return
jump filter_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3068"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:3095:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3095"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump filter_FWD_policy_foobar
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump filter_FWD_internal
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
oifname \"foobar0\" ip saddr 10.10.10.0/24 jump filter_FWD_internal
oifname \"foobar0\" ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
ip saddr 10.10.10.0/24 jump filter_FWD_internal
ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump filter_FWD_policy_foobar
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump filter_FWD_public
iifname \"foobar0\" ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" reject with icmpx admin-prohibited
ip daddr 10.10.10.0/24 jump filter_FWD_policy_foobar
ip daddr 10.10.10.0/24 jump filter_FWD_public
ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3095"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:3179:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3179"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES {
ip saddr 10.10.10.0/24 jump mangle_PRE_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump mangle_PRE_policy_foobar
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump mangle_PRE_internal
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 return
ip saddr 10.10.10.0/24 jump mangle_PRE_internal
ip saddr 10.10.10.0/24 return
iifname \"foobar0\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump mangle_PRE_policy_foobar
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump mangle_PRE_public
iifname \"foobar0\" ip daddr 10.10.10.0/24 return
iifname \"foobar0\" jump mangle_PRE_public
iifname \"foobar0\" return
jump mangle_PRE_policy_allow-host-ipv6
ip daddr 10.10.10.0/24 jump mangle_PRE_policy_foobar
ip daddr 10.10.10.0/24 jump mangle_PRE_public
ip daddr 10.10.10.0/24 return
jump mangle_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3179"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:3232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
ip saddr 10.10.10.0/24 jump nat_PRE_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump nat_PRE_policy_foobar
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump nat_PRE_internal
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 return
ip saddr 10.10.10.0/24 jump nat_PRE_internal
ip saddr 10.10.10.0/24 return
iifname \"foobar0\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump nat_PRE_policy_foobar
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump nat_PRE_public
iifname \"foobar0\" ip daddr 10.10.10.0/24 return
iifname \"foobar0\" jump nat_PRE_public
iifname \"foobar0\" return
jump nat_PRE_policy_allow-host-ipv6
ip daddr 10.10.10.0/24 jump nat_PRE_policy_foobar
ip daddr 10.10.10.0/24 jump nat_PRE_public
ip daddr 10.10.10.0/24 return
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3232"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:3285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES {
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump nat_POST_policy_foobar
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump nat_POST_internal
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 return
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump nat_POST_policy_foobar
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump nat_POST_internal
iifname \"foobar0\" ip daddr 10.10.10.0/24 return
ip daddr 10.10.10.0/24 jump nat_POST_policy_foobar
ip daddr 10.10.10.0/24 jump nat_POST_internal
ip daddr 10.10.10.0/24 return
oifname \"foobar0\" ip saddr 10.10.10.0/24 jump nat_POST_public
oifname \"foobar0\" ip saddr 10.10.10.0/24 return
iifname \"foobar0\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" oifname \"foobar0\" return
oifname \"foobar0\" jump nat_POST_public
oifname \"foobar0\" return
ip saddr 10.10.10.0/24 jump nat_POST_public
ip saddr 10.10.10.0/24 return
iifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" return
jump nat_POST_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3285"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:3335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_OUTPUT_POLICIES {
ip daddr 10.10.10.0/24 jump nat_OUT_internal
ip daddr 10.10.10.0/24 return
oifname \"foobar0\" jump nat_OUT_public
oifname \"foobar0\" return
jump nat_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3335"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:3361:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3361"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3361"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3363"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:3367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3369"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:3371:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3371"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
iifname \"foobar1\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar1\" jump filter_IN_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar0\" jump filter_IN_public
iifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3371"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:3409:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3409"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES {
oifname \"foobar1\" jump filter_OUT_internal
oifname \"foobar1\" return
oifname \"foobar0\" jump filter_OUT_public
oifname \"foobar0\" return
jump filter_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3409"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:3438:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3438"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_policy_foobar
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_policy_foobar
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_FWD_policy_foobar
iifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar1\" jump filter_FWD_public
oifname \"foobar1\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3438"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:3537:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3537"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES {
iifname \"foobar1\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump mangle_PRE_policy_foobar
iifname \"foobar1\" jump mangle_PRE_internal
iifname \"foobar1\" return
iifname \"foobar0\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump mangle_PRE_public
iifname \"foobar0\" return
jump mangle_PRE_policy_allow-host-ipv6
jump mangle_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3537"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:3578:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3578"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
iifname \"foobar1\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump nat_PRE_policy_foobar
iifname \"foobar1\" jump nat_PRE_internal
iifname \"foobar1\" return
iifname \"foobar0\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump nat_PRE_public
iifname \"foobar0\" return
jump nat_PRE_policy_allow-host-ipv6
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3578"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:3619:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3619"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump nat_POST_policy_foobar
iifname \"foobar1\" oifname \"foobar1\" jump nat_POST_internal
iifname \"foobar1\" oifname \"foobar1\" return
iifname \"foobar0\" oifname \"foobar1\" jump nat_POST_internal
iifname \"foobar0\" oifname \"foobar1\" return
oifname \"foobar1\" jump nat_POST_internal
oifname \"foobar1\" return
iifname \"foobar1\" oifname \"foobar0\" jump nat_POST_policy_foobar
iifname \"foobar1\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar1\" oifname \"foobar0\" return
iifname \"foobar0\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" oifname \"foobar0\" return
oifname \"foobar0\" jump nat_POST_public
oifname \"foobar0\" return
iifname \"foobar1\" jump nat_POST_policy_foobar
iifname \"foobar1\" jump nat_POST_public
iifname \"foobar1\" return
iifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" return
jump nat_POST_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3619"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:3663:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3663"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_OUTPUT_POLICIES {
oifname \"foobar1\" jump nat_OUT_internal
oifname \"foobar1\" return
oifname \"foobar0\" jump nat_OUT_public
oifname \"foobar0\" return
jump nat_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3663"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:3691:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3691"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3691"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3692:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3692"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3692"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3693:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3693"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3693"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:3697:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3697"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3697"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3698:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3698"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3698"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3699:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3699"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3699"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:3701:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3701"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
ip saddr 10.10.10.0/24 jump filter_IN_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 jump filter_IN_internal
ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar0\" jump filter_IN_public
iifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3701"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:3736:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3736"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES {
ip daddr 10.10.10.0/24 jump filter_OUT_internal
ip daddr 10.10.10.0/24 return
oifname \"foobar0\" jump filter_OUT_public
oifname \"foobar0\" return
jump filter_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3736"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:3763:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3763"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump filter_FWD_policy_foobar
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump filter_FWD_internal
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
oifname \"foobar0\" ip saddr 10.10.10.0/24 jump filter_FWD_policy_foobar
oifname \"foobar0\" ip saddr 10.10.10.0/24 jump filter_FWD_internal
oifname \"foobar0\" ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
ip saddr 10.10.10.0/24 jump filter_FWD_policy_foobar
ip saddr 10.10.10.0/24 jump filter_FWD_internal
ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump filter_FWD_public
iifname \"foobar0\" ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" reject with icmpx admin-prohibited
ip daddr 10.10.10.0/24 jump filter_FWD_public
ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3763"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:3846:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3846"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES {
ip saddr 10.10.10.0/24 jump mangle_PRE_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump mangle_PRE_policy_foobar
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump mangle_PRE_internal
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 return
ip saddr 10.10.10.0/24 jump mangle_PRE_policy_foobar
ip saddr 10.10.10.0/24 jump mangle_PRE_internal
ip saddr 10.10.10.0/24 return
iifname \"foobar0\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump mangle_PRE_public
iifname \"foobar0\" ip daddr 10.10.10.0/24 return
iifname \"foobar0\" jump mangle_PRE_public
iifname \"foobar0\" return
jump mangle_PRE_policy_allow-host-ipv6
ip daddr 10.10.10.0/24 jump mangle_PRE_public
ip daddr 10.10.10.0/24 return
jump mangle_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3846"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:3897:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3897"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
ip saddr 10.10.10.0/24 jump nat_PRE_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump nat_PRE_policy_foobar
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump nat_PRE_internal
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 return
ip saddr 10.10.10.0/24 jump nat_PRE_policy_foobar
ip saddr 10.10.10.0/24 jump nat_PRE_internal
ip saddr 10.10.10.0/24 return
iifname \"foobar0\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump nat_PRE_public
iifname \"foobar0\" ip daddr 10.10.10.0/24 return
iifname \"foobar0\" jump nat_PRE_public
iifname \"foobar0\" return
jump nat_PRE_policy_allow-host-ipv6
ip daddr 10.10.10.0/24 jump nat_PRE_public
ip daddr 10.10.10.0/24 return
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3897"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:3948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES {
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump nat_POST_policy_foobar
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump nat_POST_internal
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 return
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump nat_POST_internal
iifname \"foobar0\" ip daddr 10.10.10.0/24 return
ip daddr 10.10.10.0/24 jump nat_POST_internal
ip daddr 10.10.10.0/24 return
oifname \"foobar0\" ip saddr 10.10.10.0/24 jump nat_POST_policy_foobar
oifname \"foobar0\" ip saddr 10.10.10.0/24 jump nat_POST_public
oifname \"foobar0\" ip saddr 10.10.10.0/24 return
iifname \"foobar0\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" oifname \"foobar0\" return
oifname \"foobar0\" jump nat_POST_public
oifname \"foobar0\" return
ip saddr 10.10.10.0/24 jump nat_POST_policy_foobar
ip saddr 10.10.10.0/24 jump nat_POST_public
ip saddr 10.10.10.0/24 return
iifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" return
jump nat_POST_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3948"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:3999:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3999"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_OUTPUT_POLICIES {
ip daddr 10.10.10.0/24 jump nat_OUT_internal
ip daddr 10.10.10.0/24 return
oifname \"foobar0\" jump nat_OUT_public
oifname \"foobar0\" return
jump nat_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3999"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:4025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4025"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4026"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4027"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:4032:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4032"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4032"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4033:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4033"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4033"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4034"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:4036:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4036"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
iifname \"foobar1\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar1\" jump filter_IN_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar0\" jump filter_IN_public
iifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4036"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:4074:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4074"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES {
oifname \"foobar1\" jump filter_OUT_internal
oifname \"foobar1\" return
oifname \"foobar0\" jump filter_OUT_public
oifname \"foobar0\" return
jump filter_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4074"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:4103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_policy_foobar
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_FWD_policy_foobar
iifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar1\" jump filter_FWD_public
oifname \"foobar1\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4103"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:4199:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4199"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES {
iifname \"foobar1\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump mangle_PRE_internal
iifname \"foobar1\" return
iifname \"foobar0\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump mangle_PRE_public
iifname \"foobar0\" return
jump mangle_PRE_policy_allow-host-ipv6
jump mangle_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4199"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:4237:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4237"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
iifname \"foobar1\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump nat_PRE_internal
iifname \"foobar1\" return
iifname \"foobar0\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump nat_PRE_public
iifname \"foobar0\" return
jump nat_PRE_policy_allow-host-ipv6
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4237"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:4275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES {
iifname \"foobar1\" oifname \"foobar1\" jump nat_POST_internal
iifname \"foobar1\" oifname \"foobar1\" return
iifname \"foobar0\" oifname \"foobar1\" jump nat_POST_internal
iifname \"foobar0\" oifname \"foobar1\" return
oifname \"foobar1\" jump nat_POST_internal
oifname \"foobar1\" return
iifname \"foobar1\" oifname \"foobar0\" jump nat_POST_policy_foobar
iifname \"foobar1\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar1\" oifname \"foobar0\" return
iifname \"foobar0\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" oifname \"foobar0\" return
oifname \"foobar0\" jump nat_POST_public
oifname \"foobar0\" return
iifname \"foobar1\" jump nat_POST_policy_foobar
iifname \"foobar1\" jump nat_POST_public
iifname \"foobar1\" return
iifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" return
jump nat_POST_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4275"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:4318:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4318"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_OUTPUT_POLICIES {
oifname \"foobar1\" jump nat_OUT_internal
oifname \"foobar1\" return
oifname \"foobar0\" jump nat_OUT_public
oifname \"foobar0\" return
jump nat_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4318"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:4346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4349"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:4354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4356:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4356"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4356"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4357:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4357"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4357"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:4359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
ip saddr 10.10.10.0/24 jump filter_IN_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 jump filter_IN_public
ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar1\" jump filter_IN_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4359"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:4394:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4394"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES {
ip daddr 10.10.10.0/24 jump filter_OUT_public
ip daddr 10.10.10.0/24 return
oifname \"foobar1\" jump filter_OUT_internal
oifname \"foobar1\" return
jump filter_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4394"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:4421:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4421"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump filter_FWD_public
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
oifname \"foobar1\" ip saddr 10.10.10.0/24 jump filter_FWD_public
oifname \"foobar1\" ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
ip saddr 10.10.10.0/24 jump filter_FWD_public
ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"foobar1\" ip daddr 10.10.10.0/24 jump filter_FWD_policy_foobar
iifname \"foobar1\" ip daddr 10.10.10.0/24 jump filter_FWD_internal
iifname \"foobar1\" ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_FWD_policy_foobar
iifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar1\" reject with icmpx admin-prohibited
ip daddr 10.10.10.0/24 jump filter_FWD_public
ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
oifname \"foobar1\" jump filter_FWD_public
oifname \"foobar1\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4421"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:4504:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4504"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES {
ip saddr 10.10.10.0/24 jump mangle_PRE_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump mangle_PRE_public
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 return
ip saddr 10.10.10.0/24 jump mangle_PRE_public
ip saddr 10.10.10.0/24 return
iifname \"foobar1\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar1\" ip daddr 10.10.10.0/24 jump mangle_PRE_policy_foobar
iifname \"foobar1\" ip daddr 10.10.10.0/24 jump mangle_PRE_internal
iifname \"foobar1\" ip daddr 10.10.10.0/24 return
iifname \"foobar1\" jump mangle_PRE_policy_foobar
iifname \"foobar1\" jump mangle_PRE_internal
iifname \"foobar1\" return
jump mangle_PRE_policy_allow-host-ipv6
ip daddr 10.10.10.0/24 jump mangle_PRE_public
ip daddr 10.10.10.0/24 return
jump mangle_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4504"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:4556:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4556"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
ip saddr 10.10.10.0/24 jump nat_PRE_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump nat_PRE_public
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 return
ip saddr 10.10.10.0/24 jump nat_PRE_public
ip saddr 10.10.10.0/24 return
iifname \"foobar1\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar1\" ip daddr 10.10.10.0/24 jump nat_PRE_policy_foobar
iifname \"foobar1\" ip daddr 10.10.10.0/24 jump nat_PRE_internal
iifname \"foobar1\" ip daddr 10.10.10.0/24 return
iifname \"foobar1\" jump nat_PRE_policy_foobar
iifname \"foobar1\" jump nat_PRE_internal
iifname \"foobar1\" return
jump nat_PRE_policy_allow-host-ipv6
ip daddr 10.10.10.0/24 jump nat_PRE_public
ip daddr 10.10.10.0/24 return
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4556"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:4608:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4608"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES {
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump nat_POST_public
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 return
iifname \"foobar1\" ip daddr 10.10.10.0/24 jump nat_POST_policy_foobar
iifname \"foobar1\" ip daddr 10.10.10.0/24 jump nat_POST_public
iifname \"foobar1\" ip daddr 10.10.10.0/24 return
ip daddr 10.10.10.0/24 jump nat_POST_public
ip daddr 10.10.10.0/24 return
oifname \"foobar1\" ip saddr 10.10.10.0/24 jump nat_POST_internal
oifname \"foobar1\" ip saddr 10.10.10.0/24 return
iifname \"foobar1\" oifname \"foobar1\" jump nat_POST_internal
iifname \"foobar1\" oifname \"foobar1\" return
oifname \"foobar1\" jump nat_POST_internal
oifname \"foobar1\" return
ip saddr 10.10.10.0/24 jump nat_POST_public
ip saddr 10.10.10.0/24 return
iifname \"foobar1\" jump nat_POST_policy_foobar
iifname \"foobar1\" jump nat_POST_public
iifname \"foobar1\" return
jump nat_POST_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4608"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:4655:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4655"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_OUTPUT_POLICIES {
ip daddr 10.10.10.0/24 jump nat_OUT_public
ip daddr 10.10.10.0/24 return
oifname \"foobar1\" jump nat_OUT_internal
oifname \"foobar1\" return
jump nat_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4655"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:4681:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4681"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4681"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4682:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4682"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4682"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4683:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4683"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4683"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4684:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4684"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4684"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:4689:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4689"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4689"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4690:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4690"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4690"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4691:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4691"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4691"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4692:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4692"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4692"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:4694:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4694"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
ip saddr 10.10.10.0/24 jump filter_IN_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 jump filter_IN_internal
ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar0\" jump filter_IN_public
iifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4694"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:4729:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4729"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES {
ip daddr 10.10.10.0/24 jump filter_OUT_internal
ip daddr 10.10.10.0/24 return
oifname \"foobar0\" jump filter_OUT_public
oifname \"foobar0\" return
jump filter_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4729"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:4756:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4756"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump filter_FWD_internal
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
oifname \"foobar0\" ip saddr 10.10.10.0/24 jump filter_FWD_policy_foobar
oifname \"foobar0\" ip saddr 10.10.10.0/24 jump filter_FWD_internal
oifname \"foobar0\" ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
ip saddr 10.10.10.0/24 jump filter_FWD_policy_foobar
ip saddr 10.10.10.0/24 jump filter_FWD_internal
ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump filter_FWD_public
iifname \"foobar0\" ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_public
iifname \"foobar0\" reject with icmpx admin-prohibited
ip daddr 10.10.10.0/24 jump filter_FWD_public
ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4756"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:4836:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4836"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES {
ip saddr 10.10.10.0/24 jump mangle_PRE_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump mangle_PRE_internal
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 return
ip saddr 10.10.10.0/24 jump mangle_PRE_internal
ip saddr 10.10.10.0/24 return
iifname \"foobar0\" jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump mangle_PRE_public
iifname \"foobar0\" ip daddr 10.10.10.0/24 return
iifname \"foobar0\" jump mangle_PRE_public
iifname \"foobar0\" return
jump mangle_PRE_policy_allow-host-ipv6
ip daddr 10.10.10.0/24 jump mangle_PRE_public
ip daddr 10.10.10.0/24 return
jump mangle_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4836"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:4883:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4883"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
ip saddr 10.10.10.0/24 jump nat_PRE_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump nat_PRE_internal
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 return
ip saddr 10.10.10.0/24 jump nat_PRE_internal
ip saddr 10.10.10.0/24 return
iifname \"foobar0\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump nat_PRE_public
iifname \"foobar0\" ip daddr 10.10.10.0/24 return
iifname \"foobar0\" jump nat_PRE_public
iifname \"foobar0\" return
jump nat_PRE_policy_allow-host-ipv6
ip daddr 10.10.10.0/24 jump nat_PRE_public
ip daddr 10.10.10.0/24 return
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4883"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:4930:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4930"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES {
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump nat_POST_internal
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 return
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump nat_POST_internal
iifname \"foobar0\" ip daddr 10.10.10.0/24 return
ip daddr 10.10.10.0/24 jump nat_POST_internal
ip daddr 10.10.10.0/24 return
oifname \"foobar0\" ip saddr 10.10.10.0/24 jump nat_POST_policy_foobar
oifname \"foobar0\" ip saddr 10.10.10.0/24 jump nat_POST_public
oifname \"foobar0\" ip saddr 10.10.10.0/24 return
iifname \"foobar0\" oifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" oifname \"foobar0\" return
oifname \"foobar0\" jump nat_POST_public
oifname \"foobar0\" return
ip saddr 10.10.10.0/24 jump nat_POST_policy_foobar
ip saddr 10.10.10.0/24 jump nat_POST_public
ip saddr 10.10.10.0/24 return
iifname \"foobar0\" jump nat_POST_public
iifname \"foobar0\" return
jump nat_POST_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4930"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:4979:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4979"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_OUTPUT_POLICIES {
ip daddr 10.10.10.0/24 jump nat_OUT_internal
ip daddr 10.10.10.0/24 return
oifname \"foobar0\" jump nat_OUT_public
oifname \"foobar0\" return
jump nat_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4979"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:5005:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5005"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5005"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5006:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5006"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5006"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5007:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5007"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5007"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5008:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5008"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5008"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:5013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=10.20.20.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=10.20.20.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5014"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5016:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5016"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5016"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:5018:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5018"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
ip saddr 10.10.10.0/24 jump filter_IN_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 jump filter_IN_internal
ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
ip saddr 10.20.20.0/24 jump filter_IN_policy_allow-host-ipv6
ip saddr 10.20.20.0/24 jump filter_IN_public
ip saddr 10.20.20.0/24 reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5018"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:5050:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5050"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES {
ip daddr 10.10.10.0/24 jump filter_OUT_internal
ip daddr 10.10.10.0/24 return
ip daddr 10.20.20.0/24 jump filter_OUT_public
ip daddr 10.20.20.0/24 return
jump filter_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5050"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:5075:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5075"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump filter_FWD_internal
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
ip saddr 10.10.10.0/24 ip daddr 10.20.20.0/24 jump filter_FWD_policy_foobar
ip saddr 10.10.10.0/24 ip daddr 10.20.20.0/24 jump filter_FWD_internal
ip saddr 10.10.10.0/24 ip daddr 10.20.20.0/24 reject with icmpx admin-prohibited
ip saddr 10.10.10.0/24 jump filter_FWD_policy_foobar
ip saddr 10.10.10.0/24 jump filter_FWD_internal
ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
ip saddr 10.20.20.0/24 ip daddr 10.10.10.0/24 jump filter_FWD_public
ip saddr 10.20.20.0/24 ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
ip saddr 10.20.20.0/24 ip daddr 10.20.20.0/24 jump filter_FWD_public
ip saddr 10.20.20.0/24 ip daddr 10.20.20.0/24 reject with icmpx admin-prohibited
ip saddr 10.20.20.0/24 jump filter_FWD_public
ip saddr 10.20.20.0/24 reject with icmpx admin-prohibited
ip daddr 10.10.10.0/24 jump filter_FWD_public
ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
ip daddr 10.20.20.0/24 jump filter_FWD_public
ip daddr 10.20.20.0/24 reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5075"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:5147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES {
ip saddr 10.10.10.0/24 jump mangle_PRE_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump mangle_PRE_internal
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 return
ip saddr 10.10.10.0/24 ip daddr 10.20.20.0/24 jump mangle_PRE_policy_foobar
ip saddr 10.10.10.0/24 ip daddr 10.20.20.0/24 jump mangle_PRE_internal
ip saddr 10.10.10.0/24 ip daddr 10.20.20.0/24 return
ip saddr 10.10.10.0/24 jump mangle_PRE_policy_foobar
ip saddr 10.10.10.0/24 jump mangle_PRE_internal
ip saddr 10.10.10.0/24 return
ip saddr 10.20.20.0/24 jump mangle_PRE_policy_allow-host-ipv6
ip saddr 10.20.20.0/24 ip daddr 10.10.10.0/24 jump mangle_PRE_public
ip saddr 10.20.20.0/24 ip daddr 10.10.10.0/24 return
ip saddr 10.20.20.0/24 ip daddr 10.20.20.0/24 jump mangle_PRE_public
ip saddr 10.20.20.0/24 ip daddr 10.20.20.0/24 return
ip saddr 10.20.20.0/24 jump mangle_PRE_public
ip saddr 10.20.20.0/24 return
jump mangle_PRE_policy_allow-host-ipv6
ip daddr 10.10.10.0/24 jump mangle_PRE_public
ip daddr 10.10.10.0/24 return
ip daddr 10.20.20.0/24 jump mangle_PRE_public
ip daddr 10.20.20.0/24 return
jump mangle_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5147"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:5207:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5207"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
ip saddr 10.10.10.0/24 jump nat_PRE_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump nat_PRE_internal
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 return
ip saddr 10.10.10.0/24 ip daddr 10.20.20.0/24 jump nat_PRE_policy_foobar
ip saddr 10.10.10.0/24 ip daddr 10.20.20.0/24 jump nat_PRE_internal
ip saddr 10.10.10.0/24 ip daddr 10.20.20.0/24 return
ip saddr 10.10.10.0/24 jump nat_PRE_policy_foobar
ip saddr 10.10.10.0/24 jump nat_PRE_internal
ip saddr 10.10.10.0/24 return
ip saddr 10.20.20.0/24 jump nat_PRE_policy_allow-host-ipv6
ip saddr 10.20.20.0/24 ip daddr 10.10.10.0/24 jump nat_PRE_public
ip saddr 10.20.20.0/24 ip daddr 10.10.10.0/24 return
ip saddr 10.20.20.0/24 ip daddr 10.20.20.0/24 jump nat_PRE_public
ip saddr 10.20.20.0/24 ip daddr 10.20.20.0/24 return
ip saddr 10.20.20.0/24 jump nat_PRE_public
ip saddr 10.20.20.0/24 return
jump nat_PRE_policy_allow-host-ipv6
ip daddr 10.10.10.0/24 jump nat_PRE_public
ip daddr 10.10.10.0/24 return
ip daddr 10.20.20.0/24 jump nat_PRE_public
ip daddr 10.20.20.0/24 return
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5207"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:5267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES {
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump nat_POST_internal
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 return
ip saddr 10.20.20.0/24 ip daddr 10.10.10.0/24 jump nat_POST_internal
ip saddr 10.20.20.0/24 ip daddr 10.10.10.0/24 return
ip daddr 10.10.10.0/24 jump nat_POST_internal
ip daddr 10.10.10.0/24 return
ip saddr 10.10.10.0/24 ip daddr 10.20.20.0/24 jump nat_POST_policy_foobar
ip saddr 10.10.10.0/24 ip daddr 10.20.20.0/24 jump nat_POST_public
ip saddr 10.10.10.0/24 ip daddr 10.20.20.0/24 return
ip saddr 10.20.20.0/24 ip daddr 10.20.20.0/24 jump nat_POST_public
ip saddr 10.20.20.0/24 ip daddr 10.20.20.0/24 return
ip daddr 10.20.20.0/24 jump nat_POST_public
ip daddr 10.20.20.0/24 return
ip saddr 10.10.10.0/24 jump nat_POST_policy_foobar
ip saddr 10.10.10.0/24 jump nat_POST_public
ip saddr 10.10.10.0/24 return
ip saddr 10.20.20.0/24 jump nat_POST_public
ip saddr 10.20.20.0/24 return
jump nat_POST_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5267"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:5320:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5320"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_OUTPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_OUTPUT_POLICIES {
ip daddr 10.10.10.0/24 jump nat_OUT_internal
ip daddr 10.10.10.0/24 return
ip daddr 10.20.20.0/24 jump nat_OUT_public
ip daddr 10.20.20.0/24 return
jump nat_OUT_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5320"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:5344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-source=10.20.20.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-source=10.20.20.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5347"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:5349" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:5349"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_175
#AT_START_176
at_fn_group_banner 176 'policy.at:5351' \
  "policy - interfaces/sources" "                    " 7
at_xfail=no
(
  $as_echo "176. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:5351: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5351"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5351"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:5351: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:5351"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5351"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:5351: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:5351"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5351"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:5351: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5351"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5351"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:5351" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:5351"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:5351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5351"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:5351: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:5351"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5351"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:5351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5351"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:5351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5351"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:5351" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:5351"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:5351" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:5351"








    { set +x
$as_echo "$at_srcdir/policy.at:5354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5356:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5356"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5356"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5357:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5357"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5357"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:5358:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5358"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5358"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5358:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5358"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5358"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/policy.at:5359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_policy_foobar
iifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5359"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:5400:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5400"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5400"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:5401:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5401"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
iifname \"foobar0\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump nat_PRE_policy_foobar
iifname \"foobar0\" jump nat_PRE_internal
iifname \"foobar0\" return
iifname \"foobar1\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump nat_PRE_public
iifname \"foobar1\" return
jump nat_PRE_policy_allow-host-ipv6
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5401"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:5441:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5441"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_policy_foobar
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_policy_foobar
iifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar1\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar1\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_FWD_public
iifname \"foobar1\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar1\" jump filter_FWD_public
oifname \"foobar1\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5441"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:5514:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-interface foobar2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5514"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-interface foobar2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5514"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:5515:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5515"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
iifname \"foobar0\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump nat_PRE_policy_foobar
iifname \"foobar0\" jump nat_PRE_internal
iifname \"foobar0\" return
iifname \"foobar1\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump nat_PRE_public
iifname \"foobar1\" return
iifname \"foobar2\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar2\" jump nat_PRE_public
iifname \"foobar2\" return
jump nat_PRE_policy_allow-host-ipv6
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5515"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:5564:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5564"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_policy_foobar
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar2\" jump filter_FWD_policy_foobar
iifname \"foobar0\" oifname \"foobar2\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_policy_foobar
iifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar1\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar1\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar2\" jump filter_FWD_public
iifname \"foobar1\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_FWD_public
iifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar2\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar2\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar2\" oifname \"foobar2\" jump filter_FWD_public
iifname \"foobar2\" oifname \"foobar2\" reject with icmpx admin-prohibited
iifname \"foobar2\" jump filter_FWD_public
iifname \"foobar2\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar1\" jump filter_FWD_public
oifname \"foobar1\" reject with icmpx admin-prohibited
oifname \"foobar2\" jump filter_FWD_public
oifname \"foobar2\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5564"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:5682:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --remove-interface foobar2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5682"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --remove-interface foobar2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5682"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:5683:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5683"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
iifname \"foobar0\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump nat_PRE_policy_foobar
iifname \"foobar0\" jump nat_PRE_internal
iifname \"foobar0\" return
iifname \"foobar1\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump nat_PRE_public
iifname \"foobar1\" return
jump nat_PRE_policy_allow-host-ipv6
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5683"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:5723:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5723"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_policy_foobar
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_policy_foobar
iifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_public
iifname \"foobar1\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar1\" oifname \"foobar1\" jump filter_FWD_public
iifname \"foobar1\" oifname \"foobar1\" reject with icmpx admin-prohibited
iifname \"foobar1\" jump filter_FWD_public
iifname \"foobar1\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar1\" jump filter_FWD_public
oifname \"foobar1\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5723"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:5797:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --remove-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5797"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --remove-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5797"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:5798:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5798"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
iifname \"foobar0\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" jump nat_PRE_policy_foobar
iifname \"foobar0\" jump nat_PRE_internal
iifname \"foobar0\" return
jump nat_PRE_policy_allow-host-ipv6
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5798"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:5829:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5829"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_policy_foobar
iifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5829"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:5870:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5870"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5870"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:5871:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5871"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
ip saddr 10.10.10.0/24 jump nat_PRE_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump nat_PRE_public
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 return
ip saddr 10.10.10.0/24 jump nat_PRE_public
ip saddr 10.10.10.0/24 return
iifname \"foobar0\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump nat_PRE_policy_foobar
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump nat_PRE_internal
iifname \"foobar0\" ip daddr 10.10.10.0/24 return
iifname \"foobar0\" jump nat_PRE_policy_foobar
iifname \"foobar0\" jump nat_PRE_internal
iifname \"foobar0\" return
jump nat_PRE_policy_allow-host-ipv6
ip daddr 10.10.10.0/24 jump nat_PRE_public
ip daddr 10.10.10.0/24 return
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5871"
$at_failed && at_fn_log_failure
$at_traceon; }



















    { set +x
$as_echo "$at_srcdir/policy.at:5925:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-source 1234::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5925"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-source 1234::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5925"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/policy.at:5928:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5928"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5928"
$at_failed && at_fn_log_failure
$at_traceon; }







{ set +x
$as_echo "$at_srcdir/policy.at:5929: grep 'iifname \"foobar0\" ip6 daddr 1234::/64 jump nat_PRE_policy_foobar' ./stdout"
at_fn_check_prepare_trace "policy.at:5929"
( $at_check_trace; grep 'iifname "foobar0" ip6 daddr 1234::/64 jump nat_PRE_policy_foobar' ./stdout
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5929"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:5973:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --remove-source 1234::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5973"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --remove-source 1234::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5973"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/policy.at:5976:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5976"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES {
ip saddr 10.10.10.0/24 jump nat_PRE_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump nat_PRE_public
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 return
ip saddr 10.10.10.0/24 jump nat_PRE_public
ip saddr 10.10.10.0/24 return
iifname \"foobar0\" jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump nat_PRE_policy_foobar
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump nat_PRE_internal
iifname \"foobar0\" ip daddr 10.10.10.0/24 return
iifname \"foobar0\" jump nat_PRE_policy_foobar
iifname \"foobar0\" jump nat_PRE_internal
iifname \"foobar0\" return
jump nat_PRE_policy_allow-host-ipv6
ip daddr 10.10.10.0/24 jump nat_PRE_public
ip daddr 10.10.10.0/24 return
jump nat_PRE_public
return
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5976"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:6031:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6031"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6031"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:6032:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:6032"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_policy_foobar
iifname \"foobar0\" jump filter_FWD_internal
iifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6032"
$at_failed && at_fn_log_failure
$at_traceon; }















        if test x"" != x"ignore"; then
            $as_echo "policy.at:6070" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:6070"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_176
#AT_START_177
at_fn_group_banner 177 'policy.at:6072' \
  "policy - target" "                                " 7
at_xfail=no
(
  $as_echo "177. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:6072: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6072"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6072"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:6072: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:6072"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6072"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:6072: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:6072"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6072"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:6072: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6072"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6072"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:6072" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:6072"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:6072:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6072"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6072"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:6072: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:6072"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6072"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:6072:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6072"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6072"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:6072:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6072"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6072"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:6072" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:6072"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:6072" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:6072"








    { set +x
$as_echo "$at_srcdir/policy.at:6075:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6075"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6075"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:6077:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=CONTINUE "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6077"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=CONTINUE
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6077"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6078:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6078"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6078"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6079:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6079"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6079"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6080:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=REJECT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6080"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=REJECT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6080"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6081:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=DENY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6081"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=DENY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/policy.at:6081"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6082:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=default "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6082"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/policy.at:6082"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:6085:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6085"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6085"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6086:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6086"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6086"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6087:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0  "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6087"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6087"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6088:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6088"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6088"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:6089:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6089"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6089"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6089:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6089"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6089"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/policy.at:6090:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:6090"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar {
jump filter_IN_policy_foobar_pre
jump filter_IN_policy_foobar_log
jump filter_IN_policy_foobar_deny
jump filter_IN_policy_foobar_allow
jump filter_IN_policy_foobar_post
accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6090"
$at_failed && at_fn_log_failure
$at_traceon; }















        if test x"ignore" != x"ignore"; then
            $as_echo "policy.at:6119" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:6119"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_177
#AT_START_178
at_fn_group_banner 178 'policy.at:6121' \
  "policy - from file" "                             " 7
at_xfail=no
(
  $as_echo "178. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:6121: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6121"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6121"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:6121: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:6121"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6121"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:6121: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:6121"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6121"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:6121: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6121"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6121"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:6121" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:6121"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:6121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6121"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:6121: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:6121"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6121"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:6121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6121"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:6121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6121"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:6121" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:6121"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:6121" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:6121"








    { set +x
$as_echo "$at_srcdir/policy.at:6124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6124"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/policy.at:6125: ls \"./policies/allow-host-ipv6.xml\""
at_fn_check_prepare_trace "policy.at:6125"
( $at_check_trace; ls "./policies/allow-host-ipv6.xml"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6125"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/policy.at:6126:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy-from-file \"./policies/allow-host-ipv6.xml\" --name my-allow-host-ipv6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6126"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy-from-file "./policies/allow-host-ipv6.xml" --name my-allow-host-ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6126"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/policy.at:6127: ls \"./policies/my-allow-host-ipv6.xml\""
at_fn_check_prepare_trace "policy.at:6127"
( $at_check_trace; ls "./policies/my-allow-host-ipv6.xml"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6127"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/policy.at:6128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 my-allow-host-ipv6
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6128"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:6131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6131"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6131"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:6132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 my-allow-host-ipv6
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6132"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:6136" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:6136"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_178
#AT_START_179
at_fn_group_banner 179 'policy.at:6138' \
  "policy - zone drifting not allowed" "             " 7
at_xfail=no
(
  $as_echo "179. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:6138: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6138"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6138"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:6138: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:6138"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6138"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:6138: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:6138"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6138"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:6138: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6138"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6138"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:6138" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:6138"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:6138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6138"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:6138: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:6138"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6138"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:6138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6138"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:6138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6138"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:6138" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:6138"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:6138" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:6138"








    { set +x
$as_echo "$at_srcdir/policy.at:6141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone external --add-interface dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone external --add-interface dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6141"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-source 10.0.0.0/8 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-source 10.0.0.0/8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6142"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-source 10.10.0.0/16 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-source 10.10.0.0/16
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6143"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6144:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone trusted --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6144"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone trusted --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6144"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:6147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy policy-1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy policy-1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6147"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6148:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy policy-1 --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6148"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy policy-1 --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6148"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy policy-1 --add-ingress-zone trusted "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy policy-1 --add-ingress-zone trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6149"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy policy-1 --add-egress-zone external "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy policy-1 --add-egress-zone external
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6150"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:6152:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy policy-2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6152"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy policy-2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6152"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6153:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy policy-2 --add-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6153"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy policy-2 --add-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6153"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6154:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy policy-2 --add-egress-zone external "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6154"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy policy-2 --add-egress-zone external
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6154"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:6156:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy policy-3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6156"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy policy-3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6156"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6157:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy policy-3 --set-priority 10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6157"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy policy-3 --set-priority 10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6157"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6158:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy policy-3 --add-ingress-zone trusted "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6158"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy policy-3 --add-ingress-zone trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6158"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6159:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy policy-3 --add-egress-zone external "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6159"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy policy-3 --add-egress-zone external
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6159"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:6161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6161"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6161"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/policy.at:6168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:6168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
ip saddr 10.0.0.0/8 ip daddr 10.0.0.0/8 jump filter_FWD_internal
ip saddr 10.0.0.0/8 ip daddr 10.0.0.0/8 reject with icmpx admin-prohibited
ip saddr 10.0.0.0/8 ip daddr 10.10.0.0/16 jump filter_FWD_internal
ip saddr 10.0.0.0/8 ip daddr 10.10.0.0/16 reject with icmpx admin-prohibited
ip saddr 10.0.0.0/8 ip daddr 10.10.10.0/24 jump filter_FWD_internal
ip saddr 10.0.0.0/8 ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
oifname \"dummy0\" ip saddr 10.0.0.0/8 jump filter_FWD_policy_policy-1
oifname \"dummy0\" ip saddr 10.0.0.0/8 jump filter_FWD_internal
oifname \"dummy0\" ip saddr 10.0.0.0/8 reject with icmpx admin-prohibited
ip saddr 10.0.0.0/8 jump filter_FWD_internal
ip saddr 10.0.0.0/8 reject with icmpx admin-prohibited
ip saddr 10.10.0.0/16 ip daddr 10.0.0.0/8 jump filter_FWD_public
ip saddr 10.10.0.0/16 ip daddr 10.0.0.0/8 reject with icmpx admin-prohibited
ip saddr 10.10.0.0/16 ip daddr 10.10.0.0/16 jump filter_FWD_public
ip saddr 10.10.0.0/16 ip daddr 10.10.0.0/16 reject with icmpx admin-prohibited
ip saddr 10.10.0.0/16 ip daddr 10.10.10.0/24 jump filter_FWD_public
ip saddr 10.10.0.0/16 ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
oifname \"dummy0\" ip saddr 10.10.0.0/16 jump filter_FWD_policy_policy-2
oifname \"dummy0\" ip saddr 10.10.0.0/16 jump filter_FWD_public
oifname \"dummy0\" ip saddr 10.10.0.0/16 reject with icmpx admin-prohibited
ip saddr 10.10.0.0/16 jump filter_FWD_public
ip saddr 10.10.0.0/16 reject with icmpx admin-prohibited
ip saddr 10.10.10.0/24 ip daddr 10.0.0.0/8 jump filter_FWD_trusted
ip saddr 10.10.10.0/24 ip daddr 10.0.0.0/8 accept
ip saddr 10.10.10.0/24 ip daddr 10.10.0.0/16 jump filter_FWD_trusted
ip saddr 10.10.10.0/24 ip daddr 10.10.0.0/16 accept
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump filter_FWD_trusted
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 accept
oifname \"dummy0\" ip saddr 10.10.10.0/24 jump filter_FWD_policy_policy-1
oifname \"dummy0\" ip saddr 10.10.10.0/24 jump filter_FWD_trusted
oifname \"dummy0\" ip saddr 10.10.10.0/24 jump filter_FWD_policy_policy-3
oifname \"dummy0\" ip saddr 10.10.10.0/24 accept
ip saddr 10.10.10.0/24 jump filter_FWD_trusted
ip saddr 10.10.10.0/24 accept
iifname \"dummy0\" ip daddr 10.0.0.0/8 jump filter_FWD_external
iifname \"dummy0\" ip daddr 10.0.0.0/8 reject with icmpx admin-prohibited
iifname \"dummy0\" ip daddr 10.10.0.0/16 jump filter_FWD_external
iifname \"dummy0\" ip daddr 10.10.0.0/16 reject with icmpx admin-prohibited
iifname \"dummy0\" ip daddr 10.10.10.0/24 jump filter_FWD_external
iifname \"dummy0\" ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"dummy0\" oifname \"dummy0\" jump filter_FWD_external
iifname \"dummy0\" oifname \"dummy0\" reject with icmpx admin-prohibited
iifname \"dummy0\" jump filter_FWD_external
iifname \"dummy0\" reject with icmpx admin-prohibited
ip daddr 10.0.0.0/8 jump filter_FWD_public
ip daddr 10.0.0.0/8 reject with icmpx admin-prohibited
ip daddr 10.10.0.0/16 jump filter_FWD_public
ip daddr 10.10.0.0/16 reject with icmpx admin-prohibited
ip daddr 10.10.10.0/24 jump filter_FWD_public
ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
oifname \"dummy0\" jump filter_FWD_policy_policy-2
oifname \"dummy0\" jump filter_FWD_public
oifname \"dummy0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6168"
$at_failed && at_fn_log_failure
$at_traceon; }















        if test x"" != x"ignore"; then
            $as_echo "policy.at:6298" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:6298"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_179
#AT_START_180
at_fn_group_banner 180 'services.at:1' \
  "services" "                                       " 7
at_xfail=no
(
  $as_echo "180. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/services.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/services.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "services.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/services.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "services.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/services.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "services.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/services.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/services.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/services.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "services.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/services.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/services.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "services.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/services.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "services.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/services.at:1"








    { set +x
$as_echo "$at_srcdir/services.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/services.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "services.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
tcp dport 22 accept
ip saddr 10.10.10.0/24 tcp dport 22 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/services.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
tcp dport 21 ct helper set \"helper-ftp-tcp\"
tcp dport 21 accept
ip saddr 10.10.10.0/24 tcp dport 21 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }





















    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/services.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-service does-not-exist "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-service does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/services.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-service does-not-exist "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-service does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/services.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-interface raboof0 --add-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-interface raboof0 --add-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/services.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-interface raboof0 --add-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-interface raboof0 --add-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/services.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_SERVICE/d'" != x"ignore"; then
            $as_echo "services.at:97" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_SERVICE/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/services.at:97"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_180
#AT_START_181
at_fn_group_banner 181 'ports.at:1' \
  "ports" "                                          " 7
at_xfail=no
(
  $as_echo "181. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/ports.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/ports.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "ports.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/ports.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "ports.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/ports.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ports.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/ports.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/ports.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "ports.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/ports.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/ports.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ports.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "ports.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/ports.at:1"








    { set +x
$as_echo "$at_srcdir/ports.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ports.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ports.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ports.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/ports.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ports.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
tcp dport 1234 accept
udp dport 1234 accept
udp dport 4321 accept
udp dport 4444 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/ports.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
udp dport 1234 accept
sctp dport 4444 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/ports.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 123443/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-port 123443/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/bogus "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234/bogus "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ports.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=4444 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "ports.at:107" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/ports.at:107"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_181
#AT_START_182
at_fn_group_banner 182 'source_ports.at:1' \
  "source ports" "                                   " 7
at_xfail=no
(
  $as_echo "182. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/source_ports.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/source_ports.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "source_ports.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/source_ports.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "source_ports.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/source_ports.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "source_ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/source_ports.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/source_ports.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/source_ports.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "source_ports.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/source_ports.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/source_ports.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "source_ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/source_ports.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "source_ports.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/source_ports.at:1"








    { set +x
$as_echo "$at_srcdir/source_ports.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/source_ports.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/source_ports.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/source_ports.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/source_ports.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "source_ports.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
tcp sport 1234 accept
udp sport 1234 accept
udp sport 4321 accept
udp sport 4444 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/source_ports.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
udp sport 1234 accept
sctp sport 4444 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/source_ports.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 123443/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 123443/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/bogus "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234/bogus "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/source_ports.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=4444 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "source_ports.at:107" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/source_ports.at:107"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_182
#AT_START_183
at_fn_group_banner 183 'forward_ports.at:1' \
  "forward ports" "                                  " 7
at_xfail=no
(
  $as_echo "183. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/forward_ports.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/forward_ports.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "forward_ports.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/forward_ports.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "forward_ports.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/forward_ports.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "forward_ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/forward_ports.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/forward_ports.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/forward_ports.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "forward_ports.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/forward_ports.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/forward_ports.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "forward_ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/forward_ports.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "forward_ports.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/forward_ports.at:1"








    { set +x
$as_echo "$at_srcdir/forward_ports.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/forward_ports.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/forward_ports.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/forward_ports.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PRE_policy_foobar_allow {
meta nfproto ipv4 tcp dport 33 dnat ip to 10.10.10.10:33
meta nfproto ipv6 udp dport 44 dnat ip6 to [1234::4321]:4444
meta nfproto ipv4 udp dport 444 dnat ip to 10.44.44.44:4444
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/forward_ports.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/forward_ports.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/forward_ports.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PRE_policy_foobar_allow {
meta nfproto ipv4 tcp dport 33 dnat ip to 10.10.10.10:33
meta nfproto ipv4 udp dport 444 dnat ip to 10.44.44.44:4444
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/forward_ports.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/forward_ports.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PRE_policy_foobar_allow {
meta nfproto ipv4 tcp dport 22 redirect to :2222
meta nfproto ipv6 udp dport 444 redirect to :4444
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/forward_ports.at:134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:136:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:136"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:136"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:137"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:142"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:144:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:144"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:144"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:145"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:146"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:147"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:149"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:150"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:151:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:151"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:151"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:152:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:152"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:152"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:155:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:155"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:155"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:156:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:156"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:156"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:157:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:157"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:157"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:158:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:158"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:158"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:159:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:159"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:159"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:160:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:160"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:160"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:161"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:162:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:162"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:162"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:163:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:163"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:163"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:164:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:164"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:164"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:165:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:165"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:165"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:169:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:169"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:173"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:175"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:176"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:177:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:177"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:177"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:178:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:178"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:178"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:179:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:179"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:179"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:180:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:180"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:180"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:181:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:181"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:181"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:182:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:182"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:182"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:183:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:183"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PRE_policy_foobar_allow {
meta nfproto ipv4 tcp dport 22 dnat ip to 10.0.0.1:2222
meta nfproto ipv4 udp dport 444 dnat ip to 10.44.44.44:4444
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:183"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"-e '/ERROR: INVALID_FORWARD/d' -e '/ERROR: INVALID_ZONE/d'" != x"ignore"; then
            $as_echo "forward_ports.at:196" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_FORWARD/d' -e '/ERROR: INVALID_ZONE/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/forward_ports.at:196"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_183
#AT_START_184
at_fn_group_banner 184 'forward_ports.at:199' \
  "forward ports (OUTPUT)" "                         " 7
at_xfail=no
(
  $as_echo "184. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/forward_ports.at:199: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:199"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/forward_ports.at:199: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "forward_ports.at:199"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/forward_ports.at:199: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "forward_ports.at:199"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/forward_ports.at:199: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:199"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "forward_ports.at:199" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/forward_ports.at:199"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/forward_ports.at:199:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:199"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/forward_ports.at:199: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "forward_ports.at:199"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/forward_ports.at:199:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:199"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/forward_ports.at:199:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:199"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "forward_ports.at:199" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/forward_ports.at:199"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "forward_ports.at:199" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/forward_ports.at:199"








    { set +x
$as_echo "$at_srcdir/forward_ports.at:202:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:202"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:202"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:203:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone localhost "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:203"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone localhost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:203"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:204:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:204"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:204"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:204:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:204"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:204"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:209:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:209"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:209"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --add-ingress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --add-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:218:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:218"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:218"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:219:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:219"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:219"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:220:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:220"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:220"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:221:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_OUT_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:221"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_OUT_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_OUT_policy_foobar_allow {
meta nfproto ipv4 tcp dport 22 dnat ip to 10.0.0.1:2222
meta nfproto ipv4 udp dport 444 dnat ip to 10.44.44.44:4444
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/forward_ports.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-ingress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:235"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --remove-ingress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --remove-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:237:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:237"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:237"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:242:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone localhost --add-source 127.0.0.0/8 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:242"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone localhost --add-source 127.0.0.0/8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:244:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone localhost "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:244"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone localhost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:247:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:247"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:247"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:248:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:248"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:248"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --zone localhost --add-source 127.0.0.0/8 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --zone localhost --add-source 127.0.0.0/8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:249"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:250:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --add-ingress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:250"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --add-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:250"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --add-egress-zone localhost "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --add-egress-zone localhost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:251"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_OUT_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_OUT_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_OUT_policy_foobar_allow {
meta nfproto ipv4 tcp dport 22 dnat ip to 10.0.0.1:2222
meta nfproto ipv4 udp dport 444 dnat ip to 10.44.44.44:4444
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/forward_ports.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone localhost --remove-source 127.0.0.0/8 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone localhost --remove-source 127.0.0.0/8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-ingress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:271:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-egress-zone localhost "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:271"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-egress-zone localhost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:271"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:272:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --zone localhost --remove-source 127.0.0.0/8 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:272"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --zone localhost --remove-source 127.0.0.0/8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:272"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --remove-ingress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --remove-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --remove-egress-zone localhost "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --remove-egress-zone localhost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:274"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_FORWARD/d' -e '/ERROR: INVALID_ZONE/d'" != x"ignore"; then
            $as_echo "forward_ports.at:276" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_FORWARD/d' -e '/ERROR: INVALID_ZONE/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/forward_ports.at:276"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_184
#AT_START_185
at_fn_group_banner 185 'masquerade.at:1' \
  "masquerade" "                                     " 7
at_xfail=no
(
  $as_echo "185. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/masquerade.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/masquerade.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "masquerade.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/masquerade.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "masquerade.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/masquerade.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "masquerade.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/masquerade.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/masquerade.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/masquerade.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "masquerade.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/masquerade.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/masquerade.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "masquerade.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/masquerade.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "masquerade.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/masquerade.at:1"








    { set +x
$as_echo "$at_srcdir/masquerade.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/masquerade.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "masquerade.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POST_policy_foobar_allow {
meta nfproto ipv4 oifname != \"lo\" masquerade
ip saddr 10.10.10.0/24 oifname != \"lo\" masquerade
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/masquerade.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POST_policy_foobar_allow {
meta nfproto ipv4 oifname != \"lo\" masquerade
ip6 saddr 1234::/64 oifname != \"lo\" masquerade
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/masquerade.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar_host "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar_host
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:77:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar_host --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:77"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar_host --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:79:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --remove-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:79"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --remove-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar_int_to_pub "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar_int_to_pub
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar_int_to_pub --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/masquerade.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar_int_to_pub --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"-e '/ERROR: INVALID_ZONE:/d'" != x"ignore"; then
            $as_echo "masquerade.at:132" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ZONE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/masquerade.at:132"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_185
#AT_START_186
at_fn_group_banner 186 'protocols.at:1' \
  "protocols" "                                      " 7
at_xfail=no
(
  $as_echo "186. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/protocols.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/protocols.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "protocols.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/protocols.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "protocols.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/protocols.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "protocols.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/protocols.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/protocols.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/protocols.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "protocols.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/protocols.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/protocols.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "protocols.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/protocols.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "protocols.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/protocols.at:1"








    { set +x
$as_echo "$at_srcdir/protocols.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/protocols.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/protocols.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/protocols.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/protocols.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "protocols.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
meta l4proto sctp accept
meta l4proto ipv6-icmp accept
meta l4proto dccp accept
meta l4proto gre accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/protocols.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
meta l4proto ipv6-icmp accept
meta l4proto sctp accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/protocols.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-protocol dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-protocol dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule protocol value=\"dummy\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule protocol value="dummy" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule protocol value=\"dummy\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule protocol value="dummy" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_PROTOCOL: dummy/d'" != x"ignore"; then
            $as_echo "protocols.at:98" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_PROTOCOL: dummy/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/protocols.at:98"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_186
#AT_START_187
at_fn_group_banner 187 'rich_rules.at:1' \
  "rich rules" "                                     " 7
at_xfail=no
(
  $as_echo "187. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rich_rules.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rich_rules.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rich_rules.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rich_rules.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rich_rules.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rich_rules.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rich_rules.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_rules.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rich_rules.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rich_rules.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rich_rules.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rich_rules.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rich_rules.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rich_rules.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_rules.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rich_rules.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rich_rules.at:1"








    { set +x
$as_echo "$at_srcdir/rich_rules.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rich_rules.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar {
jump filter_IN_policy_foobar_pre
jump filter_IN_policy_foobar_log
jump filter_IN_policy_foobar_deny
jump filter_IN_policy_foobar_allow
jump filter_IN_policy_foobar_post
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/rich_rules.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4             source address=10.10.10.10 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4             source address=10.10.10.10 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 log accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 log accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 audit accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.12 reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.12 reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.13 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.13 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.10.10.14 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.10.10.14 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=1  source address=10.10.10.15 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=1  source address=10.10.10.15 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_rules.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_pre {
ip saddr 10.10.10.14 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_rules.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_log {
ip saddr 10.10.10.11 log
ip saddr 10.10.10.11 log level audit
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_rules.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_deny {
ip saddr 10.10.10.12 reject with icmp port-unreachable
ip saddr 10.10.10.13 drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_rules.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
ip saddr 10.10.10.10 accept
ip saddr 10.10.10.11 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_rules.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_post {
ip saddr 10.10.10.15 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_rules.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.20.20.20 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.20.20.20 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-2 destination address=10.20.20.21 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-2 destination address=10.20.20.21 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-3 source address=10.20.20.22 destination address=10.20.20.23 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-3 source address=10.20.20.22 destination address=10.20.20.23 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv6 priority=-4 source address=1234::4321 destination address=1234::4444 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv6 priority=-4 source address=1234::4321 destination address=1234::4444 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_rules.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_pre {
ip6 daddr 1234::4444 ip6 saddr 1234::4321 drop
ip daddr 10.20.20.23 ip saddr 10.20.20.22 drop
ip daddr 10.20.20.21 accept
ip saddr 10.10.10.14 accept
ip saddr 10.20.20.20 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/rich_rules.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 icmp-type name=\"neighbour-advertisement\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 icmp-type name="neighbour-advertisement" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-2 icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-2 icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_rules.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_pre {
ip6 daddr 1234::4444 ip6 saddr 1234::4321 drop
ip daddr 10.20.20.23 ip saddr 10.20.20.22 drop
ip daddr 10.20.20.21 accept
icmp echo-request accept
icmpv6 echo-request accept
ip saddr 10.10.10.14 accept
ip saddr 10.20.20.20 accept
icmpv6 nd-neighbor-advert accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/rich_rules.at:168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:173"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-2 mark set=0x6600/0xFF00' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:175"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:176"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:176"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_rules.at:177:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_policy_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:177"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_policy_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_policy_foobar_pre {
mark set mark & 0x0000ff00 ^ 0x00006600
mark set 0x000004d2
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:177"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/rich_rules.at:193:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:193"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:193"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:198:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:198"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:198"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:199:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:199"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:199:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:199"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_rules.at:200:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_policy_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:200"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_policy_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_policy_foobar_pre {
mark set mark & 0x0000ff00 ^ 0x00006600
mark set 0x000004d2
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:200"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/rich_rules.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:221:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:221"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:222:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:222"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:222"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_rules.at:224:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_policy_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:224"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_policy_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_policy_foobar_pre {
mark set mark & 0x0000ff00 ^ 0x00006600
mark set 0x000004d2
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:224"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/rich_rules.at:240:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:240"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:240"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:241:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:241"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:241"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:242:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:242"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --zone=public --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --zone=public --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:244:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:244"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:247:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:247"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:247"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/rich_rules.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:257:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --zone=public --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:257"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --zone=public --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:257"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:258:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:258"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:258"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:259:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --add-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:259"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/rich_rules.at:259"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:260:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --zone=public --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:260"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --zone=public --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:260"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:261:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:261"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:261"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:263:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:263"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:263"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32000 log prefix=\"LOG: \" level=\"warning\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32000 log prefix="LOG: " level="warning"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32001 audit accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32001 audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_rules.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_post {
ip saddr 10.10.10.15 accept
log prefix \"LOG: \"
log level audit
accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/rich_rules.at:291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=32000 log prefix=\"LOG: \" level=\"warning\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=32000 log prefix="LOG: " level="warning"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:291"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=32001 audit accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=32001 audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:293"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:293"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rich_rules.at:297:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32000 nflog prefix=\"NFLOG: \" queue-size=10' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:297"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32000 nflog prefix="NFLOG: " queue-size=10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:297"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:298:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32001 audit accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:298"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32001 audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:298"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_rules.at:300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_post {
ip saddr 10.10.10.15 accept
log prefix \"NFLOG: \" group 0 queue-threshold 10
log level audit
accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }















        if test x"-e '/ERROR: INVALID_ZONE:/d'" != x"ignore"; then
            $as_echo "rich_rules.at:322" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ZONE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rich_rules.at:322"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_187
#AT_START_188
at_fn_group_banner 188 'icmp_blocks.at:1' \
  "ICMP blocks" "                                    " 7
at_xfail=no
(
  $as_echo "188. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "icmp_blocks.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_blocks.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "icmp_blocks.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_blocks.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_blocks.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "icmp_blocks.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_blocks.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "icmp_blocks.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_blocks.at:1"








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_deny {
icmp echo-request reject with icmpx admin-prohibited
icmpv6 echo-request reject with icmpx admin-prohibited
icmp echo-reply reject with icmpx admin-prohibited
icmpv6 echo-reply reject with icmpx admin-prohibited
icmp redirect reject with icmpx admin-prohibited
icmpv6 nd-redirect reject with icmpx admin-prohibited
ip6 saddr 1234:5678::/64 icmpv6 nd-redirect reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }





















    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_deny {
icmp echo-request reject with icmpx admin-prohibited
icmpv6 echo-request reject with icmpx admin-prohibited
ip6 saddr 1234:5678::/64 icmpv6 nd-redirect reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }





















    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-icmp-block dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-icmp-block dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:142"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"dummy\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"dummy\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"-e '/ERROR: INVALID_ICMPTYPE:/d'" != x"ignore"; then
            $as_echo "icmp_blocks.at:148" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ICMPTYPE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/icmp_blocks.at:148"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_188
#AT_START_189
at_fn_group_banner 189 'rich_tcp_mss_clamp.at:5' \
  "tcp-mss-clamp" "                                  " 7
at_xfail=no
(
  $as_echo "189. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:5"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:5"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rich_tcp_mss_clamp.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_tcp_mss_clamp.at:5"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:5"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rich_tcp_mss_clamp.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_tcp_mss_clamp.at:5"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rich_tcp_mss_clamp.at:5" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rich_tcp_mss_clamp.at:5"





{ set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:8: mkdir -p ./zones"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:8"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }


cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp value="536"/>
  </rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp value="pmtu"/>
  </rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp value="thisdoesnotexist"/>
  </rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:44: grep \"WARNING: INVALID_RULE: thisdoesnotexist: rule tcp-mss-clamp value=\"thisdoesnotexist\"
\" ./firewalld.log"
at_fn_check_prepare_notrace 'an embedded newline' "rich_tcp_mss_clamp.at:44"
( $at_check_trace; grep "WARNING: INVALID_RULE: thisdoesnotexist: rule tcp-mss-clamp value="thisdoesnotexist"
" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }



cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp/>
  </rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <rule>
    <tcp-mss-clamp value="None"/>
  </rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }





    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:76: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --zone tcp --add-service http"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --zone tcp --add-service http" "rich_tcp_mss_clamp.at:76"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --zone tcp --add-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:77: cat ./zones/tcp.xml"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:77"
( $at_check_trace; cat ./zones/tcp.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<?xml version=\"1.0\" encoding=\"utf-8\"?>
<zone>
  <service name=\"ssh\"/>
  <service name=\"http\"/>
  <rule>
    <tcp-mss-clamp/>
  </rule>
</zone>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:89: rm ./zones/tcp.xml"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:89"
( $at_check_trace; rm ./zones/tcp.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:94: cat ./zones/public.xml"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:94"
( $at_check_trace; cat ./zones/public.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<?xml version=\"1.0\" encoding=\"utf-8\"?>
<zone>
  <short>Public</short>
  <description>For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.</description>
  <service name=\"ssh\"/>
  <service name=\"dhcpv6-client\"/>
  <rule>
    <tcp-mss-clamp/>
  </rule>
  <forward/>
</zone>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=0' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=0'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:108"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=536' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=536'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=pmtu' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=pmtu'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=0' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=0'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=536' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=536'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=pmtu accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=pmtu accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=pmtu' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=pmtu'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_tcp_mss_clamp.at:122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_public_allow {
tcp flags syn tcp option maxseg size set 536
tcp flags syn tcp option maxseg size set rt mtu
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }

















        if test x"ignore" != x"ignore"; then
            $as_echo "rich_tcp_mss_clamp.at:141" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rich_tcp_mss_clamp.at:141"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_189
#AT_START_190
at_fn_group_banner 190 'rich_destination_ipset.at:1' \
  "rich destination ipset" "                         " 7
at_xfail=no
(
  $as_echo "190. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rich_destination_ipset.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rich_destination_ipset.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rich_destination_ipset.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_destination_ipset.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rich_destination_ipset.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rich_destination_ipset.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_destination_ipset.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rich_destination_ipset.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rich_destination_ipset.at:1"








    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=mypolicy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=mypolicy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=mypolicy --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=mypolicy --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=mypolicy --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=mypolicy --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_destination_ipset.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 accept
ip6 daddr fe80::/64 udp dport 546 accept
ip daddr @foobar accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_mypolicy_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_destination_ipset.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_mypolicy_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_mypolicy_allow {
ip daddr @foobar accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination bogus=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination bogus=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_RULE: bad attribute/d'              -e '/ERROR: INVALID_DESTINATION: address and ipset/d'" != x"ignore"; then
            $as_echo "rich_destination_ipset.at:52" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_RULE: bad attribute/d'              -e '/ERROR: INVALID_DESTINATION: address and ipset/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rich_destination_ipset.at:52"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_190
#AT_START_191
at_fn_group_banner 191 'zone.at:1' \
  "zone - target" "                                  " 7
at_xfail=no
(
  $as_echo "191. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/zone.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "zone.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/zone.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "zone.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/zone.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/zone.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "zone.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/zone.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/zone.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "zone.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "zone.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/zone.at:1"








    { set +x
$as_echo "$at_srcdir/zone.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=default "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%% "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%%
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=CONTINUE "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=CONTINUE
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/zone.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DENY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DENY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/zone.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/zone.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_foobar {
jump filter_IN_foobar_pre
jump filter_IN_foobar_log
jump filter_IN_foobar_deny
jump filter_IN_foobar_allow
jump filter_IN_foobar_post
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/zone.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
iifname \"foobar0\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar0\" jump filter_IN_foobar
iifname \"foobar0\" accept
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }
























    { set +x
$as_echo "$at_srcdir/zone.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_foobar {
jump filter_FWD_foobar_pre
jump filter_FWD_foobar_log
jump filter_FWD_foobar_deny
jump filter_FWD_foobar_allow
jump filter_FWD_foobar_post
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/zone.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_foobar
iifname \"foobar0\" oifname \"foobar0\" accept
iifname \"foobar0\" jump filter_FWD_foobar
iifname \"foobar0\" accept
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }






















    { set +x
$as_echo "$at_srcdir/zone.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=default "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone.at:134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/zone.at:135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_foobar {
jump filter_IN_foobar_pre
jump filter_IN_foobar_log
jump filter_IN_foobar_deny
jump filter_IN_foobar_allow
jump filter_IN_foobar_post
meta l4proto { icmp, ipv6-icmp } accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/zone.at:147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
iifname \"foobar0\" jump filter_IN_policy_allow-host-ipv6
iifname \"foobar0\" jump filter_IN_foobar
iifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:147"
$at_failed && at_fn_log_failure
$at_traceon; }
























    { set +x
$as_echo "$at_srcdir/zone.at:192:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:192"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_foobar {
jump filter_FWD_foobar_pre
jump filter_FWD_foobar_log
jump filter_FWD_foobar_deny
jump filter_FWD_foobar_allow
jump filter_FWD_foobar_post
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:192"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/zone.at:203:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:203"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"foobar0\" oifname \"foobar0\" jump filter_FWD_foobar
iifname \"foobar0\" oifname \"foobar0\" reject with icmpx admin-prohibited
iifname \"foobar0\" jump filter_FWD_foobar
iifname \"foobar0\" reject with icmpx admin-prohibited
oifname \"foobar0\" jump filter_FWD_public
oifname \"foobar0\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:203"
$at_failed && at_fn_log_failure
$at_traceon; }





















        if test x"ignore" != x"ignore"; then
            $as_echo "zone.at:252" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/zone.at:252"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_191
#AT_START_192
at_fn_group_banner 192 'rpfilter.at:1' \
  "rpfilter" "                                       " 7
at_xfail=no
(
  $as_echo "192. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rpfilter.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rpfilter.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rpfilter.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rpfilter.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rpfilter.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rpfilter.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rpfilter.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rpfilter.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rpfilter.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rpfilter.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rpfilter.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rpfilter.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rpfilter.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rpfilter.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rpfilter.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rpfilter.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rpfilter.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rpfilter.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rpfilter.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rpfilter.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rpfilter.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rpfilter.at:1"






    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :






    { set +x
$as_echo "$at_srcdir/rpfilter.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rpfilter.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_PREROUTING {
icmpv6 type { nd-router-advert, nd-neighbor-solicit } accept
meta nfproto ipv6 fib saddr . mark . iif oif missing drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    else
        :






    { set +x
$as_echo "$at_srcdir/rpfilter.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rpfilter.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_PREROUTING {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    fi








        if test x"" != x"ignore"; then
            $as_echo "rpfilter.at:30" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rpfilter.at:30"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_192
#AT_START_193
at_fn_group_banner 193 'zone_combine.at:1' \
  "zone - combine" "                                 " 7
at_xfail=no
(
  $as_echo "193. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone_combine.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone_combine.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone_combine.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/zone_combine.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_combine.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/zone_combine.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "zone_combine.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_combine.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/zone_combine.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/zone_combine.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_combine.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/zone_combine.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/zone_combine.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "zone_combine.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_combine.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "zone_combine.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/zone_combine.at:1"






{ set +x
$as_echo "$at_srcdir/zone_combine.at:8: mkdir -p ./zones/combined"
at_fn_check_prepare_trace "zone_combine.at:8"
( $at_check_trace; mkdir -p ./zones/combined
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

cat >./zones/combined/zone1.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<service name="ssh" />
</zone>
_ATEOF

cat >./zones/combined/zone2.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<service name="https" />
</zone>
_ATEOF

cat >./zones/combined/zone3.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port port="12345" protocol="tcp" />
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/zone_combine.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_combine.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/zone_combine.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "block combined dmz drop external home internal public trusted work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_combine.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone combined --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone combined --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: https ssh
ports: 12345/tcp
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_combine.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "block combined/zone1 combined/zone2 combined/zone3 dmz drop external home internal public trusted work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_combine.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone combined/zone1 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone combined/zone1 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined/zone1
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_combine.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone combined/zone2 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone combined/zone2 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined/zone2
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: https
ports:
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_combine.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone combined/zone3 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone combined/zone3 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined/zone3
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services:
ports: 12345/tcp
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_combine.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone combined --add-protocol icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone combined --add-protocol icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_combine.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone combined --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone combined --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: https ssh
ports: 12345/tcp
protocols: icmp
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_combine.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone combined/zone2 --add-protocol icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone combined/zone2 --add-protocol icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_combine.at:134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone combined/zone1 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone combined/zone1 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined/zone1
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_combine.at:152:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone combined/zone2 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:152"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone combined/zone2 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined/zone2
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: https
ports:
protocols: icmp
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:152"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_combine.at:170:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone combined/zone3 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:170"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone combined/zone3 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined/zone3
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services:
ports: 12345/tcp
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "zone_combine.at:189" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/zone_combine.at:189"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_193
#AT_START_194
at_fn_group_banner 194 'startup_failsafe.at:1' \
  "startup failsafe - invalid xml" "                 " 7
at_xfail=no
(
  $as_echo "194. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"




{ set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: mkdir -p ./zones"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

cat >./zones/broken.xml <<'_ATEOF'

<zone>
<service name="ssh" />
<boguselement foo="bar" />
</zone>
_ATEOF



    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE="251"
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"





    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-service https "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-service https
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 accept
ip6 daddr fe80::/64 udp dport 546 accept
tcp dport 443 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-service https "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-service https
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-service https "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-service https
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service ssh --add-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service ssh --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype redirect --remove-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype redirect --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper tftp --add-port=44/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper tftp --add-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type=hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"ignore" != x"ignore"; then
            $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_194
#AT_START_195
at_fn_group_banner 195 'startup_failsafe.at:1' \
  "startup failsafe - bad zone" "                    " 7
at_xfail=no
(
  $as_echo "195. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"




{ set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: mkdir -p ./zones"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

cat >./zones/broken.xml <<'_ATEOF'

<zone>
<port port="1234" />
</zone>
_ATEOF



    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE="251"
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"





    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"ignore" != x"ignore"; then
            $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_195
#AT_START_196
at_fn_group_banner 196 'startup_failsafe.at:1' \
  "startup failsafe - bad policy" "                  " 7
at_xfail=no
(
  $as_echo "196. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"




{ set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: mkdir -p ./policies"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; mkdir -p ./policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

cat >./policies/broken.xml <<'_ATEOF'

<policy>
<source ipset="doesnotexist" />
</policy>
_ATEOF



    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE="251"
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"





    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"ignore" != x"ignore"; then
            $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_196
#AT_START_197
at_fn_group_banner 197 'startup_failsafe.at:1' \
  "startup failsafe - non-existent service" "        " 7
at_xfail=no
(
  $as_echo "197. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"




{ set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: mkdir -p ./zones"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

cat >./zones/broken.xml <<'_ATEOF'

<zone>
<service name="doesnotexist" />
</zone>
_ATEOF



    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE="251"
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"





    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"ignore" != x"ignore"; then
            $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_197
#AT_START_198
at_fn_group_banner 198 'startup_failsafe.at:1' \
  "startup failsafe - non-existent icmptype" "       " 7
at_xfail=no
(
  $as_echo "198. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"




{ set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: mkdir -p ./zones"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

cat >./zones/broken.xml <<'_ATEOF'

<zone>
<icmp-block name="doesnotexist" />
</zone>
_ATEOF



    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE="251"
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"





    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"ignore" != x"ignore"; then
            $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_198
#AT_START_199
at_fn_group_banner 199 'startup_failsafe.at:1' \
  "startup failsafe - bad direct" "                  " 7
at_xfail=no
(
  $as_echo "199. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"






        $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/startup_failsafe.at:1"


cat >./direct.xml <<'_ATEOF'

<direct>
<rule ipv="ipv4" table="filter" chain="INPUT" priority="1">-s 192.168.1.0/24 -j doesnotexist</rule>
</direct>
_ATEOF



    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE="251"
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"





    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"ignore" != x"ignore"; then
            $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_199
#AT_START_200
at_fn_group_banner 200 'startup_failsafe.at:1' \
  "startup failsafe - broken stock config" "         " 7
at_xfail=no
(
  $as_echo "200. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"




    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

{ set +x
$as_echo "$at_srcdir/startup_failsafe.at:1: mkdir -p ./default_config/zones"
at_fn_check_prepare_trace "startup_failsafe.at:1"
( $at_check_trace; mkdir -p ./default_config/zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

cat >./default_config/zones/broken.xml <<'_ATEOF'

<zone>
<icmp-block name="doesnotexist" />
</zone>
_ATEOF

export FIREWALLD_DEFAULT_CONFIG="./default_config"

    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE="252"
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"

sleep 5


    { set +x
$as_echo "$at_srcdir/startup_failsafe.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "startup_failsafe.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 252 $at_status "$at_srcdir/startup_failsafe.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"ignore" != x"ignore"; then
            $as_echo "startup_failsafe.at:1" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/startup_failsafe.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_200
#AT_START_201
at_fn_group_banner 201 'ipset_defer_native_ipset_creation.at:1' \
  "ipset defer native creation" "                    " 7
at_xfail=no
(
  $as_echo "201. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "ipset_defer_native_ipset_creation.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "ipset_defer_native_ipset_creation.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "ipset_defer_native_ipset_creation.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/ipset_defer_native_ipset_creation.at:1"






        $as_echo "ipset_defer_native_ipset_creation.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/ipset_defer_native_ipset_creation.at:1"






    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 10.0.0.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 10.0.0.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi







    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.0.0.0/24 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 10.1.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 10.1.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi







    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.0.0.0/24, 10.1.1.0/24 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 0 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 0 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.0.0.0/24
10.1.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi






    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --add-entry 10.2.2.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --add-entry 10.2.2.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.0.0.0/24
10.1.1.0/24
10.2.2.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi







    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.0.0.0/24, 10.1.1.0/24,
10.2.2.0/24 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi







    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 10.0.0.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 10.0.0.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi





    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-passthrough ipv4 -t filter -A INPUT -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-passthrough ipv4 -t filter -A INPUT -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.0.0.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi






    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi







    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 10.0.0.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 10.0.0.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi





    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-chain ipv4 filter foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-chain ipv4 filter foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/ipset_defer_native_ipset_creation.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ipset_defer_native_ipset_creation.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.0.0.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi





        if test x"" != x"ignore"; then
            $as_echo "ipset_defer_native_ipset_creation.at:1" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/ipset_defer_native_ipset_creation.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_201
#AT_START_202
at_fn_group_banner 202 'reset_defaults.at:1' \
  "reset defaults" "                                 " 7
at_xfail=no
(
  $as_echo "202. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/reset_defaults.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/reset_defaults.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "reset_defaults.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/reset_defaults.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "reset_defaults.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/reset_defaults.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "reset_defaults.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/reset_defaults.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/reset_defaults.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/reset_defaults.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "reset_defaults.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/reset_defaults.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/reset_defaults.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "reset_defaults.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/reset_defaults.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "reset_defaults.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/reset_defaults.at:1"








    { set +x
$as_echo "$at_srcdir/reset_defaults.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reset-to-defaults "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reset-to-defaults
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/reset_defaults.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reset-to-defaults "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reset-to-defaults
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/reset_defaults.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-service zzzzzzzzzzzz "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-service zzzzzzzzzzzz
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service ftp --add-port 22/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service ftp --add-port 22/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/reset_defaults.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-service zzzzzzzzzzzz "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-service zzzzzzzzzzzz
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper ftp --set-short \"FTP HELPER\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper ftp --set-short "FTP HELPER"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --set-short test_short "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --set-short test_short
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset test-ipset --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset test-ipset --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-icmptype test-icmptype "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-icmptype test-icmptype
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/reset_defaults.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-service zzzzzzzzzzzz "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-service zzzzzzzzzzzz
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper ftp --get-short "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper ftp --get-short
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo >>"$at_stdout"; $as_echo "FTP HELPER
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --get-short "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --get-short
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo >>"$at_stdout"; $as_echo "test_short
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-ipset test-ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-ipset test-ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-icmptype test-icmptype "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-icmptype test-icmptype
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/reset_defaults.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/reset_defaults.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service zzzzzzzzzzzz "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service zzzzzzzzzzzz
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-ipset test-ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-ipset test-ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-icmptype test-icmptype "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-icmptype test-icmptype
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/reset_defaults.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reset-to-defaults "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reset-to-defaults
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/reset_defaults.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-service zzzzzzzzzzzz "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-service zzzzzzzzzzzz
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/reset_defaults.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/reset_defaults.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper ftp --get-short "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper ftp --get-short
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --get-short "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --get-short
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo >>"$at_stdout"; $as_echo "Allow host IPv6
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-ipset test-ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-ipset test-ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 135 $at_status "$at_srcdir/reset_defaults.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-icmptype test-icmptype "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-icmptype test-icmptype
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/reset_defaults.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/reset_defaults.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service zzzzzzzzzzzz "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service zzzzzzzzzzzz
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/reset_defaults.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/reset_defaults.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-ipset test-ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-ipset test-ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 135 $at_status "$at_srcdir/reset_defaults.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-icmptype test-icmptype "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-icmptype test-icmptype
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/reset_defaults.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"ignore" != x"ignore"; then
            $as_echo "reset_defaults.at:51" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/reset_defaults.at:51"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_202
#AT_START_203
at_fn_group_banner 203 'iptables_no_flush_on_shutdown.at:1' \
  "avoid iptables flush if using nftables" "         " 7
at_xfail=no
(
  $as_echo "203. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "iptables_no_flush_on_shutdown.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "iptables_no_flush_on_shutdown.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "iptables_no_flush_on_shutdown.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/iptables_no_flush_on_shutdown.at:1"






        $as_echo "iptables_no_flush_on_shutdown.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/iptables_no_flush_on_shutdown.at:1"




    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IPTABLES -t filter -N firewalld_testsuite "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPTABLES -t filter -N firewalld_testsuite
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IPTABLES -t filter -I firewalld_testsuite -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPTABLES -t filter -I firewalld_testsuite -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IP6TABLES -t filter -N firewalld_testsuite "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IP6TABLES -t filter -N firewalld_testsuite
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IP6TABLES -t filter -I firewalld_testsuite -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IP6TABLES -t filter -I firewalld_testsuite -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$EBTABLES -t filter -N firewalld_testsuite "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $EBTABLES -t filter -N firewalld_testsuite
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$EBTABLES -t filter -I firewalld_testsuite -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $EBTABLES -t filter -I firewalld_testsuite -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L firewalld_testsuite; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L firewalld_testsuite; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L firewalld_testsuite; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L firewalld_testsuite; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L firewalld_testsuite; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L firewalld_testsuite; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-j ACCEPT
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L firewalld_testsuite; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L firewalld_testsuite; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L firewalld_testsuite; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L firewalld_testsuite; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L firewalld_testsuite; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L firewalld_testsuite; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-j ACCEPT
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "iptables_no_flush_on_shutdown.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "iptables_no_flush_on_shutdown.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/iptables_no_flush_on_shutdown.at:1"





    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L firewalld_testsuite; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L firewalld_testsuite; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L firewalld_testsuite; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L firewalld_testsuite; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L firewalld_testsuite; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L firewalld_testsuite; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-j ACCEPT
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter INPUT 1 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter INPUT 1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L firewalld_testsuite; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L firewalld_testsuite; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L firewalld_testsuite; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L firewalld_testsuite; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L firewalld_testsuite; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L firewalld_testsuite; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IPTABLES -t filter -N firewalld_testsuite "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPTABLES -t filter -N firewalld_testsuite
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IPTABLES -t filter -I firewalld_testsuite -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPTABLES -t filter -I firewalld_testsuite -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IP6TABLES -t filter -N firewalld_testsuite "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IP6TABLES -t filter -N firewalld_testsuite
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IP6TABLES -t filter -I firewalld_testsuite -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IP6TABLES -t filter -I firewalld_testsuite -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$EBTABLES -t filter -N firewalld_testsuite "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $EBTABLES -t filter -N firewalld_testsuite
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$EBTABLES -t filter -I firewalld_testsuite -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $EBTABLES -t filter -I firewalld_testsuite -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L firewalld_testsuite; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L firewalld_testsuite; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L firewalld_testsuite; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L firewalld_testsuite; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L firewalld_testsuite; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L firewalld_testsuite; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-j ACCEPT
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L firewalld_testsuite; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L firewalld_testsuite; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L firewalld_testsuite; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L firewalld_testsuite; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi






    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L firewalld_testsuite; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L firewalld_testsuite; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IPTABLES -t filter -N firewalld_testsuite "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPTABLES -t filter -N firewalld_testsuite
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IPTABLES -t filter -I firewalld_testsuite -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPTABLES -t filter -I firewalld_testsuite -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IP6TABLES -t filter -N firewalld_testsuite "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IP6TABLES -t filter -N firewalld_testsuite
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IP6TABLES -t filter -I firewalld_testsuite -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IP6TABLES -t filter -I firewalld_testsuite -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$EBTABLES -t filter -N firewalld_testsuite "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $EBTABLES -t filter -N firewalld_testsuite
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$EBTABLES -t filter -I firewalld_testsuite -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $EBTABLES -t filter -I firewalld_testsuite -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L firewalld_testsuite; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L firewalld_testsuite; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L firewalld_testsuite; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L firewalld_testsuite; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi






    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L firewalld_testsuite; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L firewalld_testsuite; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 filter INPUT 1 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 filter INPUT 1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IPTABLES -t filter -N firewalld_testsuite "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPTABLES -t filter -N firewalld_testsuite
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IPTABLES -t filter -I firewalld_testsuite -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPTABLES -t filter -I firewalld_testsuite -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IP6TABLES -t filter -N firewalld_testsuite "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IP6TABLES -t filter -N firewalld_testsuite
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IP6TABLES -t filter -I firewalld_testsuite -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IP6TABLES -t filter -I firewalld_testsuite -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$EBTABLES -t filter -N firewalld_testsuite "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $EBTABLES -t filter -N firewalld_testsuite
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$EBTABLES -t filter -I firewalld_testsuite -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $EBTABLES -t filter -I firewalld_testsuite -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-chain ipv4 filter firewalld_foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-chain ipv4 filter firewalld_foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L firewalld_testsuite; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L firewalld_testsuite; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L firewalld_testsuite; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L firewalld_testsuite; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L firewalld_testsuite; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L firewalld_testsuite; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IPTABLES -t filter -N firewalld_testsuite "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPTABLES -t filter -N firewalld_testsuite
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IPTABLES -t filter -I firewalld_testsuite -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPTABLES -t filter -I firewalld_testsuite -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IP6TABLES -t filter -N firewalld_testsuite "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IP6TABLES -t filter -N firewalld_testsuite
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IP6TABLES -t filter -I firewalld_testsuite -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IP6TABLES -t filter -I firewalld_testsuite -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$EBTABLES -t filter -N firewalld_testsuite "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $EBTABLES -t filter -N firewalld_testsuite
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$EBTABLES -t filter -I firewalld_testsuite -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $EBTABLES -t filter -I firewalld_testsuite -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-passthrough ipv4 -t filter -I INPUT -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-passthrough ipv4 -t filter -I INPUT -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L firewalld_testsuite; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L firewalld_testsuite; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L firewalld_testsuite; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L firewalld_testsuite; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/iptables_no_flush_on_shutdown.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L firewalld_testsuite; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "iptables_no_flush_on_shutdown.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L firewalld_testsuite; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "iptables_no_flush_on_shutdown.at:1" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/iptables_no_flush_on_shutdown.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_203
#AT_START_204
at_fn_group_banner 204 'zone_priority.at:1' \
  "zone - priority" "                                " 7
at_xfail=no
(
  $as_echo "204. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone_priority.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone_priority.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone_priority.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/zone_priority.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_priority.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/zone_priority.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "zone_priority.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_priority.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/zone_priority.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/zone_priority.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_priority.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/zone_priority.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/zone_priority.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "zone_priority.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_priority.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "zone_priority.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/zone_priority.at:1"








    { set +x
$as_echo "$at_srcdir/zone_priority.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_priority.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority -32769 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority -32769
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority -32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority -32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority  32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority  32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority  32767 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority  32767
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority -32769 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority -32769
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority -32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority -32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority  32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority  32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority  32767 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority  32767
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority -32769 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority -32769
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority -32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority -32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority  32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority  32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority  32767 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority  32767
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority 0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority 0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority 0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_priority.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --get-ingress-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --get-ingress-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --set-ingress-priority 0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --set-ingress-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --get-egress-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --get-egress-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --set-egress-priority 0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --set-egress-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_priority.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --set-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --set-ingress-priority -2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --set-ingress-priority -2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --set-egress-priority -3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --set-egress-priority -3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --set-priority 0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --set-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_priority.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority 123 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority 123
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --get-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "123
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority 456 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority 456
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --get-ingress-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --get-ingress-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "456
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority 789 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority 789
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --get-egress-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --get-egress-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "789
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_priority.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority 666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority 666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority 666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority 666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --get-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-1
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_priority.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority -2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority -2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority -3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority -3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --get-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_priority.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-zone foobar | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_priority.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-zone foobar | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "foobar
target: default
ingress-priority: -2
egress-priority: -3
icmp-block-inversion: no
interfaces:
sources:
services:
ports:
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_priority.at:83:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone zone-1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:83"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone zone-1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-1 --set-priority -30000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-1 --set-priority -30000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:85:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-1 --add-interface dummy-1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:85"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-1 --add-interface dummy-1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone zone-2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone zone-2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-2 --set-priority -10000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-2 --set-priority -10000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-2 --add-interface dummy-2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-2 --add-interface dummy-2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone zone-3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone zone-3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-3 --set-ingress-priority -5000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-3 --set-ingress-priority -5000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-3 --set-egress-priority -2000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-3 --set-egress-priority -2000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-3 --add-interface dummy-3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-3 --add-interface dummy-3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone zone-4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone zone-4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-4 --set-ingress-priority -100 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-4 --set-ingress-priority -100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-4 --set-egress-priority 1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-4 --set-egress-priority 1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-4 --add-interface dummy-4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-4 --add-interface dummy-4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone zone-5 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone zone-5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-5 --set-ingress-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-5 --set-ingress-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-5 --set-egress-priority 100 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-5 --set-egress-priority 100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-5 --add-interface dummy-5 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-5 --add-interface dummy-5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone zone-6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone zone-6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-6 --set-priority 500 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-6 --set-priority 500
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-6 --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-6 --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone zone-7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone zone-7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-7 --set-priority 1000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-7 --set-priority 1000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-7 --add-interface dummy-7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-7 --add-interface dummy-7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone zone-8 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone zone-8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-8 --set-priority 30000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-8 --set-priority 30000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:108"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-8 --add-source 10.0.0.0/8 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-8 --add-source 10.0.0.0/8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone zone-0andlast "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone zone-0andlast
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-0andlast --set-ingress-priority 0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-0andlast --set-ingress-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-0andlast --set-egress-priority 32000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-0andlast --set-egress-priority 32000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-0andlast --add-interface dummy-9 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-0andlast --add-interface dummy-9
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_priority.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/zone_priority.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_priority.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
iifname \"dummy-1\" jump filter_IN_policy_allow-host-ipv6
iifname \"dummy-1\" jump filter_IN_zone-1
iifname \"dummy-1\" reject with icmpx admin-prohibited
iifname \"dummy-2\" jump filter_IN_policy_allow-host-ipv6
iifname \"dummy-2\" jump filter_IN_zone-2
iifname \"dummy-2\" reject with icmpx admin-prohibited
iifname \"dummy-3\" jump filter_IN_policy_allow-host-ipv6
iifname \"dummy-3\" jump filter_IN_zone-3
iifname \"dummy-3\" reject with icmpx admin-prohibited
iifname \"dummy-4\" jump filter_IN_policy_allow-host-ipv6
iifname \"dummy-4\" jump filter_IN_zone-4
iifname \"dummy-4\" reject with icmpx admin-prohibited
iifname \"dummy-5\" jump filter_IN_policy_allow-host-ipv6
iifname \"dummy-5\" jump filter_IN_zone-5
iifname \"dummy-5\" reject with icmpx admin-prohibited
iifname \"dummy-9\" jump filter_IN_policy_allow-host-ipv6
iifname \"dummy-9\" jump filter_IN_zone-0andlast
iifname \"dummy-9\" reject with icmpx admin-prohibited
ip saddr 10.10.10.0/24 jump filter_IN_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 jump filter_IN_zone-6
ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"dummy-7\" jump filter_IN_policy_allow-host-ipv6
iifname \"dummy-7\" jump filter_IN_zone-7
iifname \"dummy-7\" reject with icmpx admin-prohibited
ip saddr 10.0.0.0/8 jump filter_IN_policy_allow-host-ipv6
ip saddr 10.0.0.0/8 jump filter_IN_zone-8
ip saddr 10.0.0.0/8 reject with icmpx admin-prohibited
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/zone_priority.at:153:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_priority.at:153"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES {
iifname \"dummy-1\" oifname \"dummy-1\" jump filter_FWD_zone-1
iifname \"dummy-1\" oifname \"dummy-1\" reject with icmpx admin-prohibited
iifname \"dummy-1\" oifname \"dummy-2\" jump filter_FWD_zone-1
iifname \"dummy-1\" oifname \"dummy-2\" reject with icmpx admin-prohibited
iifname \"dummy-1\" oifname \"dummy-3\" jump filter_FWD_zone-1
iifname \"dummy-1\" oifname \"dummy-3\" reject with icmpx admin-prohibited
iifname \"dummy-1\" oifname \"dummy-4\" jump filter_FWD_zone-1
iifname \"dummy-1\" oifname \"dummy-4\" reject with icmpx admin-prohibited
iifname \"dummy-1\" oifname \"dummy-5\" jump filter_FWD_zone-1
iifname \"dummy-1\" oifname \"dummy-5\" reject with icmpx admin-prohibited
iifname \"dummy-1\" ip daddr 10.10.10.0/24 jump filter_FWD_zone-1
iifname \"dummy-1\" ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"dummy-1\" oifname \"dummy-7\" jump filter_FWD_zone-1
iifname \"dummy-1\" oifname \"dummy-7\" reject with icmpx admin-prohibited
iifname \"dummy-1\" ip daddr 10.0.0.0/8 jump filter_FWD_zone-1
iifname \"dummy-1\" ip daddr 10.0.0.0/8 reject with icmpx admin-prohibited
iifname \"dummy-1\" oifname \"dummy-9\" jump filter_FWD_zone-1
iifname \"dummy-1\" oifname \"dummy-9\" reject with icmpx admin-prohibited
iifname \"dummy-1\" jump filter_FWD_zone-1
iifname \"dummy-1\" reject with icmpx admin-prohibited
iifname \"dummy-2\" oifname \"dummy-1\" jump filter_FWD_zone-2
iifname \"dummy-2\" oifname \"dummy-1\" reject with icmpx admin-prohibited
iifname \"dummy-2\" oifname \"dummy-2\" jump filter_FWD_zone-2
iifname \"dummy-2\" oifname \"dummy-2\" reject with icmpx admin-prohibited
iifname \"dummy-2\" oifname \"dummy-3\" jump filter_FWD_zone-2
iifname \"dummy-2\" oifname \"dummy-3\" reject with icmpx admin-prohibited
iifname \"dummy-2\" oifname \"dummy-4\" jump filter_FWD_zone-2
iifname \"dummy-2\" oifname \"dummy-4\" reject with icmpx admin-prohibited
iifname \"dummy-2\" oifname \"dummy-5\" jump filter_FWD_zone-2
iifname \"dummy-2\" oifname \"dummy-5\" reject with icmpx admin-prohibited
iifname \"dummy-2\" ip daddr 10.10.10.0/24 jump filter_FWD_zone-2
iifname \"dummy-2\" ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"dummy-2\" oifname \"dummy-7\" jump filter_FWD_zone-2
iifname \"dummy-2\" oifname \"dummy-7\" reject with icmpx admin-prohibited
iifname \"dummy-2\" ip daddr 10.0.0.0/8 jump filter_FWD_zone-2
iifname \"dummy-2\" ip daddr 10.0.0.0/8 reject with icmpx admin-prohibited
iifname \"dummy-2\" oifname \"dummy-9\" jump filter_FWD_zone-2
iifname \"dummy-2\" oifname \"dummy-9\" reject with icmpx admin-prohibited
iifname \"dummy-2\" jump filter_FWD_zone-2
iifname \"dummy-2\" reject with icmpx admin-prohibited
iifname \"dummy-3\" oifname \"dummy-1\" jump filter_FWD_zone-3
iifname \"dummy-3\" oifname \"dummy-1\" reject with icmpx admin-prohibited
iifname \"dummy-3\" oifname \"dummy-2\" jump filter_FWD_zone-3
iifname \"dummy-3\" oifname \"dummy-2\" reject with icmpx admin-prohibited
iifname \"dummy-3\" oifname \"dummy-3\" jump filter_FWD_zone-3
iifname \"dummy-3\" oifname \"dummy-3\" reject with icmpx admin-prohibited
iifname \"dummy-3\" oifname \"dummy-4\" jump filter_FWD_zone-3
iifname \"dummy-3\" oifname \"dummy-4\" reject with icmpx admin-prohibited
iifname \"dummy-3\" oifname \"dummy-5\" jump filter_FWD_zone-3
iifname \"dummy-3\" oifname \"dummy-5\" reject with icmpx admin-prohibited
iifname \"dummy-3\" ip daddr 10.10.10.0/24 jump filter_FWD_zone-3
iifname \"dummy-3\" ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"dummy-3\" oifname \"dummy-7\" jump filter_FWD_zone-3
iifname \"dummy-3\" oifname \"dummy-7\" reject with icmpx admin-prohibited
iifname \"dummy-3\" ip daddr 10.0.0.0/8 jump filter_FWD_zone-3
iifname \"dummy-3\" ip daddr 10.0.0.0/8 reject with icmpx admin-prohibited
iifname \"dummy-3\" oifname \"dummy-9\" jump filter_FWD_zone-3
iifname \"dummy-3\" oifname \"dummy-9\" reject with icmpx admin-prohibited
iifname \"dummy-3\" jump filter_FWD_zone-3
iifname \"dummy-3\" reject with icmpx admin-prohibited
iifname \"dummy-4\" oifname \"dummy-1\" jump filter_FWD_zone-4
iifname \"dummy-4\" oifname \"dummy-1\" reject with icmpx admin-prohibited
iifname \"dummy-4\" oifname \"dummy-2\" jump filter_FWD_zone-4
iifname \"dummy-4\" oifname \"dummy-2\" reject with icmpx admin-prohibited
iifname \"dummy-4\" oifname \"dummy-3\" jump filter_FWD_zone-4
iifname \"dummy-4\" oifname \"dummy-3\" reject with icmpx admin-prohibited
iifname \"dummy-4\" oifname \"dummy-4\" jump filter_FWD_zone-4
iifname \"dummy-4\" oifname \"dummy-4\" reject with icmpx admin-prohibited
iifname \"dummy-4\" oifname \"dummy-5\" jump filter_FWD_zone-4
iifname \"dummy-4\" oifname \"dummy-5\" reject with icmpx admin-prohibited
iifname \"dummy-4\" ip daddr 10.10.10.0/24 jump filter_FWD_zone-4
iifname \"dummy-4\" ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"dummy-4\" oifname \"dummy-7\" jump filter_FWD_zone-4
iifname \"dummy-4\" oifname \"dummy-7\" reject with icmpx admin-prohibited
iifname \"dummy-4\" ip daddr 10.0.0.0/8 jump filter_FWD_zone-4
iifname \"dummy-4\" ip daddr 10.0.0.0/8 reject with icmpx admin-prohibited
iifname \"dummy-4\" oifname \"dummy-9\" jump filter_FWD_zone-4
iifname \"dummy-4\" oifname \"dummy-9\" reject with icmpx admin-prohibited
iifname \"dummy-4\" jump filter_FWD_zone-4
iifname \"dummy-4\" reject with icmpx admin-prohibited
iifname \"dummy-5\" oifname \"dummy-1\" jump filter_FWD_zone-5
iifname \"dummy-5\" oifname \"dummy-1\" reject with icmpx admin-prohibited
iifname \"dummy-5\" oifname \"dummy-2\" jump filter_FWD_zone-5
iifname \"dummy-5\" oifname \"dummy-2\" reject with icmpx admin-prohibited
iifname \"dummy-5\" oifname \"dummy-3\" jump filter_FWD_zone-5
iifname \"dummy-5\" oifname \"dummy-3\" reject with icmpx admin-prohibited
iifname \"dummy-5\" oifname \"dummy-4\" jump filter_FWD_zone-5
iifname \"dummy-5\" oifname \"dummy-4\" reject with icmpx admin-prohibited
iifname \"dummy-5\" oifname \"dummy-5\" jump filter_FWD_zone-5
iifname \"dummy-5\" oifname \"dummy-5\" reject with icmpx admin-prohibited
iifname \"dummy-5\" ip daddr 10.10.10.0/24 jump filter_FWD_zone-5
iifname \"dummy-5\" ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"dummy-5\" oifname \"dummy-7\" jump filter_FWD_zone-5
iifname \"dummy-5\" oifname \"dummy-7\" reject with icmpx admin-prohibited
iifname \"dummy-5\" ip daddr 10.0.0.0/8 jump filter_FWD_zone-5
iifname \"dummy-5\" ip daddr 10.0.0.0/8 reject with icmpx admin-prohibited
iifname \"dummy-5\" oifname \"dummy-9\" jump filter_FWD_zone-5
iifname \"dummy-5\" oifname \"dummy-9\" reject with icmpx admin-prohibited
iifname \"dummy-5\" jump filter_FWD_zone-5
iifname \"dummy-5\" reject with icmpx admin-prohibited
iifname \"dummy-9\" oifname \"dummy-1\" jump filter_FWD_zone-0andlast
iifname \"dummy-9\" oifname \"dummy-1\" reject with icmpx admin-prohibited
iifname \"dummy-9\" oifname \"dummy-2\" jump filter_FWD_zone-0andlast
iifname \"dummy-9\" oifname \"dummy-2\" reject with icmpx admin-prohibited
iifname \"dummy-9\" oifname \"dummy-3\" jump filter_FWD_zone-0andlast
iifname \"dummy-9\" oifname \"dummy-3\" reject with icmpx admin-prohibited
iifname \"dummy-9\" oifname \"dummy-4\" jump filter_FWD_zone-0andlast
iifname \"dummy-9\" oifname \"dummy-4\" reject with icmpx admin-prohibited
iifname \"dummy-9\" oifname \"dummy-5\" jump filter_FWD_zone-0andlast
iifname \"dummy-9\" oifname \"dummy-5\" reject with icmpx admin-prohibited
iifname \"dummy-9\" ip daddr 10.10.10.0/24 jump filter_FWD_zone-0andlast
iifname \"dummy-9\" ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"dummy-9\" oifname \"dummy-7\" jump filter_FWD_zone-0andlast
iifname \"dummy-9\" oifname \"dummy-7\" reject with icmpx admin-prohibited
iifname \"dummy-9\" ip daddr 10.0.0.0/8 jump filter_FWD_zone-0andlast
iifname \"dummy-9\" ip daddr 10.0.0.0/8 reject with icmpx admin-prohibited
iifname \"dummy-9\" oifname \"dummy-9\" jump filter_FWD_zone-0andlast
iifname \"dummy-9\" oifname \"dummy-9\" reject with icmpx admin-prohibited
iifname \"dummy-9\" jump filter_FWD_zone-0andlast
iifname \"dummy-9\" reject with icmpx admin-prohibited
oifname \"dummy-1\" ip saddr 10.10.10.0/24 jump filter_FWD_zone-6
oifname \"dummy-1\" ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
oifname \"dummy-2\" ip saddr 10.10.10.0/24 jump filter_FWD_zone-6
oifname \"dummy-2\" ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
oifname \"dummy-3\" ip saddr 10.10.10.0/24 jump filter_FWD_zone-6
oifname \"dummy-3\" ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
oifname \"dummy-4\" ip saddr 10.10.10.0/24 jump filter_FWD_zone-6
oifname \"dummy-4\" ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
oifname \"dummy-5\" ip saddr 10.10.10.0/24 jump filter_FWD_zone-6
oifname \"dummy-5\" ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 jump filter_FWD_zone-6
ip saddr 10.10.10.0/24 ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
oifname \"dummy-7\" ip saddr 10.10.10.0/24 jump filter_FWD_zone-6
oifname \"dummy-7\" ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
ip saddr 10.10.10.0/24 ip daddr 10.0.0.0/8 jump filter_FWD_zone-6
ip saddr 10.10.10.0/24 ip daddr 10.0.0.0/8 reject with icmpx admin-prohibited
oifname \"dummy-9\" ip saddr 10.10.10.0/24 jump filter_FWD_zone-6
oifname \"dummy-9\" ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
ip saddr 10.10.10.0/24 jump filter_FWD_zone-6
ip saddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"dummy-7\" oifname \"dummy-1\" jump filter_FWD_zone-7
iifname \"dummy-7\" oifname \"dummy-1\" reject with icmpx admin-prohibited
iifname \"dummy-7\" oifname \"dummy-2\" jump filter_FWD_zone-7
iifname \"dummy-7\" oifname \"dummy-2\" reject with icmpx admin-prohibited
iifname \"dummy-7\" oifname \"dummy-3\" jump filter_FWD_zone-7
iifname \"dummy-7\" oifname \"dummy-3\" reject with icmpx admin-prohibited
iifname \"dummy-7\" oifname \"dummy-4\" jump filter_FWD_zone-7
iifname \"dummy-7\" oifname \"dummy-4\" reject with icmpx admin-prohibited
iifname \"dummy-7\" oifname \"dummy-5\" jump filter_FWD_zone-7
iifname \"dummy-7\" oifname \"dummy-5\" reject with icmpx admin-prohibited
iifname \"dummy-7\" ip daddr 10.10.10.0/24 jump filter_FWD_zone-7
iifname \"dummy-7\" ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
iifname \"dummy-7\" oifname \"dummy-7\" jump filter_FWD_zone-7
iifname \"dummy-7\" oifname \"dummy-7\" reject with icmpx admin-prohibited
iifname \"dummy-7\" ip daddr 10.0.0.0/8 jump filter_FWD_zone-7
iifname \"dummy-7\" ip daddr 10.0.0.0/8 reject with icmpx admin-prohibited
iifname \"dummy-7\" oifname \"dummy-9\" jump filter_FWD_zone-7
iifname \"dummy-7\" oifname \"dummy-9\" reject with icmpx admin-prohibited
iifname \"dummy-7\" jump filter_FWD_zone-7
iifname \"dummy-7\" reject with icmpx admin-prohibited
oifname \"dummy-1\" ip saddr 10.0.0.0/8 jump filter_FWD_zone-8
oifname \"dummy-1\" ip saddr 10.0.0.0/8 reject with icmpx admin-prohibited
oifname \"dummy-2\" ip saddr 10.0.0.0/8 jump filter_FWD_zone-8
oifname \"dummy-2\" ip saddr 10.0.0.0/8 reject with icmpx admin-prohibited
oifname \"dummy-3\" ip saddr 10.0.0.0/8 jump filter_FWD_zone-8
oifname \"dummy-3\" ip saddr 10.0.0.0/8 reject with icmpx admin-prohibited
oifname \"dummy-4\" ip saddr 10.0.0.0/8 jump filter_FWD_zone-8
oifname \"dummy-4\" ip saddr 10.0.0.0/8 reject with icmpx admin-prohibited
oifname \"dummy-5\" ip saddr 10.0.0.0/8 jump filter_FWD_zone-8
oifname \"dummy-5\" ip saddr 10.0.0.0/8 reject with icmpx admin-prohibited
ip saddr 10.0.0.0/8 ip daddr 10.10.10.0/24 jump filter_FWD_zone-8
ip saddr 10.0.0.0/8 ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
oifname \"dummy-7\" ip saddr 10.0.0.0/8 jump filter_FWD_zone-8
oifname \"dummy-7\" ip saddr 10.0.0.0/8 reject with icmpx admin-prohibited
ip saddr 10.0.0.0/8 ip daddr 10.0.0.0/8 jump filter_FWD_zone-8
ip saddr 10.0.0.0/8 ip daddr 10.0.0.0/8 reject with icmpx admin-prohibited
oifname \"dummy-9\" ip saddr 10.0.0.0/8 jump filter_FWD_zone-8
oifname \"dummy-9\" ip saddr 10.0.0.0/8 reject with icmpx admin-prohibited
ip saddr 10.0.0.0/8 jump filter_FWD_zone-8
ip saddr 10.0.0.0/8 reject with icmpx admin-prohibited
oifname \"dummy-1\" jump filter_FWD_public
oifname \"dummy-1\" reject with icmpx admin-prohibited
oifname \"dummy-2\" jump filter_FWD_public
oifname \"dummy-2\" reject with icmpx admin-prohibited
oifname \"dummy-3\" jump filter_FWD_public
oifname \"dummy-3\" reject with icmpx admin-prohibited
oifname \"dummy-4\" jump filter_FWD_public
oifname \"dummy-4\" reject with icmpx admin-prohibited
oifname \"dummy-5\" jump filter_FWD_public
oifname \"dummy-5\" reject with icmpx admin-prohibited
ip daddr 10.10.10.0/24 jump filter_FWD_public
ip daddr 10.10.10.0/24 reject with icmpx admin-prohibited
oifname \"dummy-7\" jump filter_FWD_public
oifname \"dummy-7\" reject with icmpx admin-prohibited
ip daddr 10.0.0.0/8 jump filter_FWD_public
ip daddr 10.0.0.0/8 reject with icmpx admin-prohibited
oifname \"dummy-9\" jump filter_FWD_public
oifname \"dummy-9\" reject with icmpx admin-prohibited
jump filter_FWD_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:153"
$at_failed && at_fn_log_failure
$at_traceon; }
























    { set +x
$as_echo "$at_srcdir/zone_priority.at:753:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-zone zone-2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_priority.at:753"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-zone zone-2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "zone-2 (active)
target: default
ingress-priority: -10000
egress-priority: -10000
icmp-block-inversion: no
interfaces: dummy-2
sources:
services:
ports:
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:753"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:771:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-zone zone-4 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_priority.at:771"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-zone zone-4 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "zone-4 (active)
target: default
ingress-priority: -100
egress-priority: 1
icmp-block-inversion: no
interfaces: dummy-4
sources:
services:
ports:
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:771"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/zone_priority.at:791: cat ./zones/zone-5.xml"
at_fn_check_prepare_trace "zone_priority.at:791"
( $at_check_trace; cat ./zones/zone-5.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<?xml version=\"1.0\" encoding=\"utf-8\"?>
<zone ingress-priority=\"-1\" egress-priority=\"100\">
  <interface name=\"dummy-5\"/>
</zone>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:791"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/zone_priority.at:799:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --set-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:799"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:799"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:800:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --set-ingress-priority -2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:800"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --set-ingress-priority -2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:800"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:801:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --set-egress-priority -3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:801"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --set-egress-priority -3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:801"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:802:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --get-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:802"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:802"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:803:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --get-ingress-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:803"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --get-ingress-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:803"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --get-egress-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --get-egress-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:804"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"ignore" != x"ignore"; then
            $as_echo "zone_priority.at:806" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/zone_priority.at:806"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_204
#AT_START_205
at_fn_group_banner 205 'nftables_flowtable.at:1' \
  "nftables flowtable" "                             " 7
at_xfail=no
(
  $as_echo "205. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "nftables_flowtable.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "nftables_flowtable.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "nftables_flowtable.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/nftables_flowtable.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "nftables_flowtable.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "nftables_flowtable.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/nftables_flowtable.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "nftables_flowtable.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/nftables_flowtable.at:1"







    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_flowtable "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_flowtable
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "nftables_flowtable.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add flowtable inet firewalld_check_flowtable foobar { hook ingress priority 0 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/nftables_flowtable.at:1"

    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_flowtable "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_flowtable
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




$as_echo "nftables_flowtable.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} command -v iperf3 >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/nftables_flowtable.at:1"
$as_echo "nftables_flowtable.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} command -v sysctl >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/nftables_flowtable.at:1"
$as_echo "nftables_flowtable.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} command -v jq >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/nftables_flowtable.at:1"



cat <<HERE >> ./cleanup
ip netns delete fwd-test-${at_group_normalized}-send
ip netns delete fwd-test-${at_group_normalized}-recv
HERE


{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns add fwd-test-\${at_group_normalized}-send"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}-send
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns add fwd-test-\${at_group_normalized}-recv"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}-recv
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip link add fwd-test-send type veth peer name fwd-test-fwd-0"
at_fn_check_prepare_trace "nftables_flowtable.at:1"
( $at_check_trace; ip link add fwd-test-send type veth peer name fwd-test-fwd-0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip link add fwd-test-recv type veth peer name fwd-test-fwd-1"
at_fn_check_prepare_trace "nftables_flowtable.at:1"
( $at_check_trace; ip link add fwd-test-recv type veth peer name fwd-test-fwd-1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip link set fwd-test-send netns fwd-test-\${at_group_normalized}-send"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip link set fwd-test-send netns fwd-test-${at_group_normalized}-send
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip link set fwd-test-recv netns fwd-test-\${at_group_normalized}-recv"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip link set fwd-test-recv netns fwd-test-${at_group_normalized}-recv
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-send ip link set fwd-test-send up"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-send ip link set fwd-test-send up
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-recv ip link set fwd-test-recv up"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-recv ip link set fwd-test-recv up
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-send ip addr add 10.10.10.2/24 dev fwd-test-send"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-send ip addr add 10.10.10.2/24 dev fwd-test-send
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-send ip route add 10.20.20.0/24 nexthop via 10.10.10.1 dev fwd-test-send"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-send ip route add 10.20.20.0/24 nexthop via 10.10.10.1 dev fwd-test-send
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-recv ip addr add 10.20.20.2/24 dev fwd-test-recv"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-recv ip addr add 10.20.20.2/24 dev fwd-test-recv
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-recv ip route add 10.10.10.0/24 nexthop via 10.20.20.1 dev fwd-test-recv"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-recv ip route add 10.10.10.0/24 nexthop via 10.20.20.1 dev fwd-test-recv
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip link set fwd-test-fwd-0 netns fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip link set fwd-test-fwd-0 netns fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip link set fwd-test-fwd-1 netns fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip link set fwd-test-fwd-1 netns fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} ip addr add 10.10.10.1/24 dev fwd-test-fwd-0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} ip addr add 10.10.10.1/24 dev fwd-test-fwd-0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} ip addr add 10.20.20.1/24 dev fwd-test-fwd-1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} ip addr add 10.20.20.1/24 dev fwd-test-fwd-1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} ip link set fwd-test-fwd-0 up "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} ip link set fwd-test-fwd-0 up
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} ip link set fwd-test-fwd-1 up "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} ip link set fwd-test-fwd-1 up
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sed -i 's/^NftablesFlowtable.*/NftablesFlowtable=off/' ./firewalld.conf "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sed -i 's/^NftablesFlowtable.*/NftablesFlowtable=off/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --add-interface fwd-test-fwd-0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --add-interface fwd-test-fwd-0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --add-interface fwd-test-fwd-1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --add-interface fwd-test-fwd-1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-recv iperf3 -s -1 >/dev/null &"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-recv iperf3 -s -1 >/dev/null &
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-send iperf3 -J -c 10.20.20.2 -O 10 --connect-timeout 10 --interval 0           | jq '.end.sum_received.bits_per_second' | { read RESULT; printf \"%s\" \${RESULT%.*} > ./bps-tcp ; }"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-send iperf3 -J -c 10.20.20.2 -O 10 --connect-timeout 10 --interval 0           | jq '.end.sum_received.bits_per_second' | { read RESULT; printf "%s" ${RESULT%.*} > ./bps-tcp ; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-recv iperf3 -s -1 >/dev/null &"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-recv iperf3 -s -1 >/dev/null &
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-send iperf3 -u -J -c 10.20.20.2 --connect-timeout 10 --interval 0 --bitrate 0           | jq '.end.sum.bits_per_second' | { read RESULT; printf \"%s\" \${RESULT%.*} > ./bps-udp ; }"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-send iperf3 -u -J -c 10.20.20.2 --connect-timeout 10 --interval 0 --bitrate 0           | jq '.end.sum.bits_per_second' | { read RESULT; printf "%s" ${RESULT%.*} > ./bps-udp ; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} ip link delete fwd-test-fwd-0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} ip link delete fwd-test-fwd-0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} ip link delete fwd-test-fwd-1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} ip link delete fwd-test-fwd-1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns delete fwd-test-\${at_group_normalized}-send"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns delete fwd-test-${at_group_normalized}-send
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns delete fwd-test-\${at_group_normalized}-recv"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns delete fwd-test-${at_group_normalized}-recv
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: mv ./bps-tcp ./bps-tcp-disabled"
at_fn_check_prepare_trace "nftables_flowtable.at:1"
( $at_check_trace; mv ./bps-tcp ./bps-tcp-disabled
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: mv ./bps-udp ./bps-udp-disabled"
at_fn_check_prepare_trace "nftables_flowtable.at:1"
( $at_check_trace; mv ./bps-udp ./bps-udp-disabled
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns add fwd-test-\${at_group_normalized}-send"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}-send
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns add fwd-test-\${at_group_normalized}-recv"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}-recv
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip link add fwd-test-send type veth peer name fwd-test-fwd-0"
at_fn_check_prepare_trace "nftables_flowtable.at:1"
( $at_check_trace; ip link add fwd-test-send type veth peer name fwd-test-fwd-0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip link add fwd-test-recv type veth peer name fwd-test-fwd-1"
at_fn_check_prepare_trace "nftables_flowtable.at:1"
( $at_check_trace; ip link add fwd-test-recv type veth peer name fwd-test-fwd-1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip link set fwd-test-send netns fwd-test-\${at_group_normalized}-send"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip link set fwd-test-send netns fwd-test-${at_group_normalized}-send
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip link set fwd-test-recv netns fwd-test-\${at_group_normalized}-recv"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip link set fwd-test-recv netns fwd-test-${at_group_normalized}-recv
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-send ip link set fwd-test-send up"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-send ip link set fwd-test-send up
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-recv ip link set fwd-test-recv up"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-recv ip link set fwd-test-recv up
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-send ip addr add 10.10.10.2/24 dev fwd-test-send"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-send ip addr add 10.10.10.2/24 dev fwd-test-send
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-send ip route add 10.20.20.0/24 nexthop via 10.10.10.1 dev fwd-test-send"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-send ip route add 10.20.20.0/24 nexthop via 10.10.10.1 dev fwd-test-send
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-recv ip addr add 10.20.20.2/24 dev fwd-test-recv"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-recv ip addr add 10.20.20.2/24 dev fwd-test-recv
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-recv ip route add 10.10.10.0/24 nexthop via 10.20.20.1 dev fwd-test-recv"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-recv ip route add 10.10.10.0/24 nexthop via 10.20.20.1 dev fwd-test-recv
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip link set fwd-test-fwd-0 netns fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip link set fwd-test-fwd-0 netns fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip link set fwd-test-fwd-1 netns fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip link set fwd-test-fwd-1 netns fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} ip addr add 10.10.10.1/24 dev fwd-test-fwd-0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} ip addr add 10.10.10.1/24 dev fwd-test-fwd-0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} ip addr add 10.20.20.1/24 dev fwd-test-fwd-1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} ip addr add 10.20.20.1/24 dev fwd-test-fwd-1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} ip link set fwd-test-fwd-0 up "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} ip link set fwd-test-fwd-0 up
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} ip link set fwd-test-fwd-1 up "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} ip link set fwd-test-fwd-1 up
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sed -i 's/^NftablesFlowtable.*/NftablesFlowtable=fwd-test-fwd-0 fwd-test-fwd-1/' ./firewalld.conf "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sed -i 's/^NftablesFlowtable.*/NftablesFlowtable=fwd-test-fwd-0 fwd-test-fwd-1/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --add-interface fwd-test-fwd-0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --add-interface fwd-test-fwd-0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --add-interface fwd-test-fwd-1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --add-interface fwd-test-fwd-1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-recv iperf3 -s -1 >/dev/null &"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-recv iperf3 -s -1 >/dev/null &
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-send iperf3 -J -c 10.20.20.2 -O 10 --connect-timeout 10 --interval 0           | jq '.end.sum_received.bits_per_second' | { read RESULT; printf \"%s\" \${RESULT%.*} > ./bps-tcp ; }"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-send iperf3 -J -c 10.20.20.2 -O 10 --connect-timeout 10 --interval 0           | jq '.end.sum_received.bits_per_second' | { read RESULT; printf "%s" ${RESULT%.*} > ./bps-tcp ; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-recv iperf3 -s -1 >/dev/null &"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-recv iperf3 -s -1 >/dev/null &
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns exec fwd-test-\${at_group_normalized}-send iperf3 -u -J -c 10.20.20.2 --connect-timeout 10 --interval 0 --bitrate 0           | jq '.end.sum.bits_per_second' | { read RESULT; printf \"%s\" \${RESULT%.*} > ./bps-udp ; }"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns exec fwd-test-${at_group_normalized}-send iperf3 -u -J -c 10.20.20.2 --connect-timeout 10 --interval 0 --bitrate 0           | jq '.end.sum.bits_per_second' | { read RESULT; printf "%s" ${RESULT%.*} > ./bps-udp ; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} ip link delete fwd-test-fwd-0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} ip link delete fwd-test-fwd-0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} ip link delete fwd-test-fwd-1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} ip link delete fwd-test-fwd-1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns delete fwd-test-\${at_group_normalized}-send"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns delete fwd-test-${at_group_normalized}-send
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: ip netns delete fwd-test-\${at_group_normalized}-recv"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_flowtable.at:1"
( $at_check_trace; ip netns delete fwd-test-${at_group_normalized}-recv
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: mv ./bps-tcp ./bps-tcp-enabled"
at_fn_check_prepare_trace "nftables_flowtable.at:1"
( $at_check_trace; mv ./bps-tcp ./bps-tcp-enabled
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: mv ./bps-udp ./bps-udp-enabled"
at_fn_check_prepare_trace "nftables_flowtable.at:1"
( $at_check_trace; mv ./bps-udp ./bps-udp-enabled
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: expr \$(cat ./bps-tcp-enabled) \\> \$(cat ./bps-tcp-disabled)"
at_fn_check_prepare_notrace 'a $(...) command substitution' "nftables_flowtable.at:1"
( $at_check_trace; expr $(cat ./bps-tcp-enabled) \> $(cat ./bps-tcp-disabled)
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
if $at_failed; then :
  echo
echo "FAIL: TCP BPS decreased with flowtable enabled."
echo "Disabled: $(cat ./bps-tcp-disabled)"
echo "Enabled:  $(cat ./bps-tcp-enabled)"
echo

else
  echo
echo "PASS: TCP BPS increased with flowtable enabled."
echo "Disabled: $(cat ./bps-tcp-disabled)"
echo "Enabled:  $(cat ./bps-tcp-enabled)"
echo

fi
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/nftables_flowtable.at:1: expr \$(cat ./bps-udp-enabled) \\> \$(cat ./bps-udp-disabled)"
at_fn_check_prepare_notrace 'a $(...) command substitution' "nftables_flowtable.at:1"
( $at_check_trace; expr $(cat ./bps-udp-enabled) \> $(cat ./bps-udp-disabled)
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/nftables_flowtable.at:1"
if $at_failed; then :
  echo
echo "FAIL: UDP BPS decreased with flowtable enabled."
echo "Disabled: $(cat ./bps-udp-disabled)"
echo "Enabled:  $(cat ./bps-udp-enabled)"
echo

else
  echo
echo "PASS: UDP BPS increased with flowtable enabled."
echo "Disabled: $(cat ./bps-udp-disabled)"
echo "Enabled:  $(cat ./bps-udp-enabled)"
echo

fi
$at_failed && at_fn_log_failure
$at_traceon; }





        if test x"" != x"ignore"; then
            $as_echo "nftables_flowtable.at:1" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/nftables_flowtable.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_205
#AT_START_206
at_fn_group_banner 206 'nftables_counters.at:1' \
  "nftables counters" "                              " 7
at_xfail=no
(
  $as_echo "206. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/nftables_counters.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_counters.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/nftables_counters.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "nftables_counters.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/nftables_counters.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "nftables_counters.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/nftables_counters.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_counters.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "nftables_counters.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/nftables_counters.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/nftables_counters.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_counters.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/nftables_counters.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "nftables_counters.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/nftables_counters.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_counters.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/nftables_counters.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_counters.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "nftables_counters.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/nftables_counters.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "nftables_counters.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/nftables_counters.at:1"










    { set +x
$as_echo "$at_srcdir/nftables_counters.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "nftables_counters.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_public
reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/nftables_counters.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "nftables_counters.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 accept
ip6 daddr fe80::/64 udp dport 546 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







{ set +x
$as_echo "$at_srcdir/nftables_counters.at:1: sed -i 's/^NftablesCounters=.*/NftablesCounters=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "nftables_counters.at:1"
( $at_check_trace; sed -i 's/^NftablesCounters=.*/NftablesCounters=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/nftables_counters.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_counters.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/nftables_counters.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_counters.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/nftables_counters.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "nftables_counters.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES {
counter packets 0 bytes 0 jump filter_IN_policy_allow-host-ipv6
counter packets 0 bytes 0 jump filter_IN_public
counter packets 0 bytes 0 reject with icmpx admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/nftables_counters.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "nftables_counters.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 counter packets 0 bytes 0 accept
ip6 daddr fe80::/64 udp dport 546 counter packets 0 bytes 0 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/nftables_counters.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_counters.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/nftables_counters.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "nftables_counters.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 counter packets 0 bytes 0 accept
ip6 daddr fe80::/64 udp dport 546 counter packets 0 bytes 0 accept
tcp dport 1234 counter packets 0 bytes 0 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/nftables_counters.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --remove-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "nftables_counters.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --remove-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/nftables_counters.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'                 -e 's/\\(icmp\\|icmpv6\\|icmpx\\) type \\([a-z-]\\+\\)/\\1 \\2/g'                 -e 's/reject\$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "nftables_counters.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'                 -e 's/\(icmp\|icmpv6\|icmpx\) type \([a-z-]\+\)/\1 \2/g'                 -e 's/reject$/reject with icmp port-unreachable/g'                 -e 's/burst 5 packets //g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 counter packets 0 bytes 0 accept
ip6 daddr fe80::/64 udp dport 546 counter packets 0 bytes 0 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/nftables_counters.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"" != x"ignore"; then
            $as_echo "nftables_counters.at:1" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/nftables_counters.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_206
#AT_START_207
at_fn_group_banner 207 'firewall-cmd.at:5' \
  "basic options" "                                  " 8
at_xfail=no
(
  $as_echo "207. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:5"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "State: running

No options specified
usage: 'firewall-cmd --help' for usage information or see firewall-cmd(1) man page
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -h "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -h
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --help "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --help
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -V "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -V
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --complete-reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --complete-reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --panic-on "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --panic-on
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-panic "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-panic
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "yes
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --panic-off "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --panic-off
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-panic "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-panic
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "no
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:32" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:32"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_207
#AT_START_208
at_fn_group_banner 208 'firewall-cmd.at:34' \
  "get/list options" "                               " 8
at_xfail=no
(
  $as_echo "208. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:34"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:34"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:34"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:34"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:34" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:34"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:34" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:34"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:34" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:34"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:34" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:34"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-icmptypes "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-icmptypes "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-all-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:48" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:48"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_208
#AT_START_209
at_fn_group_banner 209 'firewall-cmd.at:50' \
  "default zone" "                                   " 8
at_xfail=no
(
  $as_echo "209. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:50"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:50"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:50"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:50"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:50" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:50"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:50" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:50"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:50" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:50"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:50" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:50"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-default-zone=\"home\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-default-zone="home"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "home
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-default-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-default-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:60" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:60"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_209
#AT_START_210
at_fn_group_banner 210 'firewall-cmd.at:62' \
  "user zone" "                                      " 8
at_xfail=no
(
  $as_echo "210. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:62"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:62"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:62"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:62"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:62" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:62"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:62" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:62"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:62" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:62"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:62" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:62"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --new-zone=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zones | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zones | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --get-target | grep default "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --get-target | grep default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:69:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=BAD "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:69"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=BAD
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/firewall-cmd.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%% "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%%
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --get-target | grep ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --get-target | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --add-service=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --add-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:77:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=123456789abcefghi "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:77"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=123456789abcefghi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=123456789abcefghij "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=123456789abcefghij
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 116 $at_status "$at_srcdir/firewall-cmd.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_TARGET: /d'              -e '/ERROR: INVALID_NAME: /d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:79" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_TARGET: /d'              -e '/ERROR: INVALID_NAME: /d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:79"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_210
#AT_START_211
at_fn_group_banner 211 'firewall-cmd.at:82' \
  "zone interfaces" "                                " 8
at_xfail=no
(
  $as_echo "211. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:82: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:82"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:82: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:82"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:82: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:82"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:82: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:82"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:82" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:82"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:82" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:82"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:82" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:82"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:82" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:82"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:85:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --add-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:85"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --add-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --change-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --change-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=block --add-interface=dummy1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=block --add-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=block --remove-interface=dummy1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=block --remove-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --change-zone=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --change-zone=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dmz
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --list-interfaces "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --remove-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --remove-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --change-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --change-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --remove-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --remove-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --get-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --get-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --get-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --set-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --get-zone-of-interface "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --get-zone-of-interface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-interface=perm_dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:121"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --list-interfaces "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "perm_dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:127"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --change-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:130"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:131"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --query-interface perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --change-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:136:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:136"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:136"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --query-interface perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=trusted --remove-interface=perm_dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=trusted --remove-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-interface=foobar+++ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-interface=foobar+++
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:146"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-interface=foobar+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:147"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:163:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-interface=foobar+++ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:163"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-interface=foobar+++
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:163"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:164:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-interface=foobar+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:164"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:164"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:165:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-interface=foobar+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:165"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:165"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-interface=foobar+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:167:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:167"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:167"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:167:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:167"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:167"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: ZONE_CONFLICT: perm_dummy/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:168" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: ZONE_CONFLICT: perm_dummy/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:168"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_211
#AT_START_212
at_fn_group_banner 212 'firewall-cmd.at:170' \
  "zone sources" "                                   " 8
at_xfail=no
(
  $as_echo "212. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:170: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:170"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:170: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:170"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:170: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:170"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:170: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:170"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:170" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:170"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:170" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:170"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:170" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:170"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:170" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:170"











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public (default)
sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --query-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --change-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --remove-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --query-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public (default)
sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --query-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --change-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --remove-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --query-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.1/255.255.255.0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.1/255.255.255.0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public (default)
sources: 192.168.1.1/255.255.255.0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --query-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --query-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --change-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --change-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --remove-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --remove-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.1/255.255.255.0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.1/255.255.255.0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --query-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --query-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-source=192.168.1.1/255.255.255.0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-source=192.168.1.1/255.255.255.0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }









    if $IP6TABLES -L >/dev/null 2>&1; then
        :





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public (default)
sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --change-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --change-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --remove-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --remove-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public (default)
sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --query-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --change-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --change-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --remove-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --remove-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --query-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }






    else
        :

    fi








        if test x" -e '/ERROR: ZONE_CONFLICT/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:221" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed  -e '/ERROR: ZONE_CONFLICT/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:221"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_212
#AT_START_213
at_fn_group_banner 213 'firewall-cmd.at:223' \
  "services" "                                       " 8
at_xfail=no
(
  $as_echo "213. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:223: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:223"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:223: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:223"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:223: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:223"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:223: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:223"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:223" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:223"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:223" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:223"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:223" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:223"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:223" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:223"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=dns --timeout 60 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:226"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=dns --timeout 60 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:227:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:227"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:227"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:228:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-service=dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:228"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:228"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service=dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:230:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=smtpssssssss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:230"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:230"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:231:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=dns --timeout "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:231"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=dns --timeout
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=dns --add-interface=dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:232"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=dns --timeout 60 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=dns --timeout 60
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-service dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:235"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --list-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dns ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:238:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-service dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:238"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:238"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --remove-service=dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --remove-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:244:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-service=dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:244"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=smtpssssssss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=dns --add-interface=dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:248:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=http --add-service=nfs --timeout=1h "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:248"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=http --add-service=nfs --timeout=1h
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:248"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:249"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:250:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service=nfs --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:250"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:250"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-service=nfs --remove-service=http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-service=nfs --remove-service=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:251"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-service=http --add-service=nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-service=http --add-service=nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-service http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:257:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-service=nfs --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:257"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:257"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:258:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-service=nfs --remove-service=http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:258"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-service=nfs --remove-service=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:258"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:263:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent  --query-service http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:263"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent  --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:263"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:264:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent  --query-service nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:264"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent  --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:264"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_SERVICE:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:265" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_SERVICE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:265"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_213
#AT_START_214
at_fn_group_banner 214 'firewall-cmd.at:267' \
  "user services" "                                  " 8
at_xfail=no
(
  $as_echo "214. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:267: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:267"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:267: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:267"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:267: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:267"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:267: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:267"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:267" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:267"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:267" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:267"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:267" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:267"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:267" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:267"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-service=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:272:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-service=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:272"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:272"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-services | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:275"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:276:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:276"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:278:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:278"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:281:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:281"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:281"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:283"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:284:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:284"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:285"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:287:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:287"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:287"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:288:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:288"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:289:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:289"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:289"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:291"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:294:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:294"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:296"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:297:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-protocol ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:297"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-protocol ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:297"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:298:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:298"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:298"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:302:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-module=sip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:302"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:302"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:303:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-module=sip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:303"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:303"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:304:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-module=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:304"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:304"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:305:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-module=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:305"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:305"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:306:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-module=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:306"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:306"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-module=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:309:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-helper=sip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:309"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-helper=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:309"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:310:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-helper=sip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:310"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-helper=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:310"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-helper=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:311"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:312:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-helper=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:312"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:312"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:313:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --get-service-helpers "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:313"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --get-service-helpers
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:313"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:316:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-helper=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:316"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:316"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:317:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-helper=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:317"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:317"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:319:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:319"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/firewall-cmd.at:319"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:320:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4:foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:320"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4:foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:320"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:321:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4:1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:321"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4:1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:321"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:322:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:322"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:322"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-destination=ipv6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-destination=ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:330:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-service=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:330"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:330"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:331:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-services | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:331"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:331"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:332:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-service=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:332"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:332"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:333:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-services | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:333"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:333"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./foobar-to-be-renamed <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="icmp" />
<port protocol="tcp" port="1234" />
</service>




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-service-from-file=\"./foobar-to-be-renamed\" --name=\"foobar-from-file\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-service-from-file="./foobar-to-be-renamed" --name="foobar-from-file"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-services | grep foobar-from-file "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-services | grep foobar-from-file
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:335"
$at_failed && at_fn_log_failure
$at_traceon; }




_ATEOF




        if test x"-e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:346" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:346"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_214
#AT_START_215
at_fn_group_banner 215 'firewall-cmd.at:349' \
  "ports" "                                          " 8
at_xfail=no
(
  $as_echo "215. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:349: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:349"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:349: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:349"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:349: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:349"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:349: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:349"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:349" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:349"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:349" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:349"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:349" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:349"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:349" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:349"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone home --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone home --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:353"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:354"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 254 $at_status "$at_srcdir/firewall-cmd.at:355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:356:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo --add-port bar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:356"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo --add-port bar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 254 $at_status "$at_srcdir/firewall-cmd.at:356"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:357:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=666/tcp --zone=public --timeout=30m "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:357"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=666/tcp --zone=public --timeout=30m
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:357"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:358:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:358"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:358"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:360:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=111-222/udp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:360"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:360"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:361:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:361"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:361"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:362"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=5000/sctp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port 5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=222/dccp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:370:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port 222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:370"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:370"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:371:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:371"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:371"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:373"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:374:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:374"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:374"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:376:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port=666/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:376"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:377:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=111-222/udp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:377"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:377"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:378:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:378"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:378"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:380:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:380"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:380"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:382:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:382"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:382"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:383:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=5000/sctp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:383"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:383"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:384:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port 5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:384"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:384"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:385:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:385"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:385"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:386:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:386"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:386"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:387:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=222/dccp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:387"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:387"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:388:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port 222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:388"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:388"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:389:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:389"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:389"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:391:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=80/tcp --add-port 443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:391"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:391"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:392:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=80/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:392"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:392"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:393:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:393"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:393"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port 80/tcp --remove-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:394"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:395:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=80/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:395"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:395"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:396:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:396"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:396"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:398:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=80/tcp --add-port 443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:398"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:398"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:399:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=80/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:399"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:399"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:400:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:400"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:400"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:401:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port 80/tcp --remove-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:401"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:401"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:402:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=80/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:402"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:402"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:403:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:403"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:403"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:404" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:404"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_215
#AT_START_216
at_fn_group_banner 216 'firewall-cmd.at:406' \
  "source ports" "                                   " 8
at_xfail=no
(
  $as_echo "216. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:406: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:406"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:406: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:406"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:406: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:406"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:406: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:406"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:406" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:406"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:406" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:406"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:406" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:406"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:406" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:406"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone home --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:409"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone home --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:410:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:410"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:410"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:411:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:411"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:411"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:412:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=666/tcp --zone=public --timeout=30m "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:412"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=666/tcp --zone=public --timeout=30m
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:412"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:413:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-source-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:413"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:413"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:414:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:414"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:415:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=111-222/udp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:415"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:415"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:416:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-source-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:416"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:416"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:417:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:417"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:417"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:419:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:419"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:419"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:420:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:420"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:420"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:421:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:421"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:421"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:422:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-source-port=666/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:422"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-source-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:422"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:423:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=111-222/udp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:423"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:423"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:424:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:424"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:424"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:425:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-source-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:425"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:425"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:426:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:426"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:426"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:428:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=80/tcp --add-source-port 443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:428"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:428"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:429:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=80/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:429"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:429"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:430:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:430"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:430"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-source-port 80/tcp --remove-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:431"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:432:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=80/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:432"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:432"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:433:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:433"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:433"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:435:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=80/tcp --add-source-port 443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:435"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:435"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:436:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=80/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:436"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:436"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:437:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:437"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:437"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:438:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-source-port 80/tcp --remove-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:438"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:438"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:439:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=80/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:439"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:439"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:440:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:440"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:440"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:441" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:441"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_216
#AT_START_217
at_fn_group_banner 217 'firewall-cmd.at:443' \
  "protocols" "                                      " 8
at_xfail=no
(
  $as_echo "217. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:443"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:443"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:443"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:443"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:443" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:443"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:443" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:443"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:443" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:443"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:443" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:443"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-protocol=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:446"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:447:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-protocol=dccp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:447"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:447"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:448:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:448"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:448"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:449:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:449"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:449"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:450:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:450"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:450"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:451:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-protocol=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:451"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:451"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-protocol=dccp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:452"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:453:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:453"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:453"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:454:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:454"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:454"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:455"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:457:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:457"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:457"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:458:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=ddp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:458"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:458"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:459"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:460:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-protocol ddp --remove-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:460"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:460"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:461:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:461"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:461"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:462:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:462"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:462"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:463:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:463"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:463"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:464:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=ddp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:464"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:464"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:465:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:465"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:465"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:466:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-protocol ddp --remove-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:466"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:466"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:467:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:467"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:467"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:468:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:468"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:468"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_PROTOCOL: dummy/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:469" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_PROTOCOL: dummy/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:469"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_217
#AT_START_218
at_fn_group_banner 218 'firewall-cmd.at:471' \
  "masquerade" "                                     " 8
at_xfail=no
(
  $as_echo "218. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:471: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:471"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:471: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:471"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:471: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:471"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:471: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:471"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:471" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:471"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:471" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:471"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:471" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:471"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:471" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:471"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:474:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-masquerade --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:474"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:483:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POST_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:483"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POST_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MASQUERADE 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:483"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:486:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POST_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:486"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POST_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:486"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:488:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:488"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:488"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:489:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:489"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:489"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:490:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:490"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:490"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:492:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-masquerade --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:492"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:493:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:493"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:493"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:494:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:494"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:494"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:495:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:495"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:495"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:496" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:496"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_218
#AT_START_219
at_fn_group_banner 219 'firewall-cmd.at:498' \
  "forward" "                                        " 8
at_xfail=no
(
  $as_echo "219. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:498"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:498"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:498"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:498"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:498" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:498"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:498" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:498"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:498" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:498"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:498" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:498"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:501:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --add-interface=dummy --add-interface=dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:501"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --add-interface=dummy --add-interface=dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:502:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:502"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:502"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:516:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:516"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:516"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:520:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:520"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0
ACCEPT 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:520"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:525:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --remove-interface=dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:525"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --remove-interface=dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:525"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:533:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:533"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:536:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:536"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:536"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:539:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --add-interface=dummy3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:539"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --add-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:539"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:548:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:548"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:548"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:552:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:552"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0
ACCEPT 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:552"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:556:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:556"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:556"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:557:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:557"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:557"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:564:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:564"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:564"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:566:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:566"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:566"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:568:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:568"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:568"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:569:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --remove-interface=dummy --remove-interface=dummy3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:569"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --remove-interface=dummy --remove-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:569"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:571:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=home --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:571"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=home --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:571"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:572:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=home --add-interface=dummy --add-interface=dummy3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:572"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=home --add-interface=dummy --add-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:572"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:573:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=home --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:573"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=home --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:573"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:574:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:574"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:574"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:574:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:574"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:574"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:575:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=home --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:575"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:575"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:585:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:585"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 0 -- 0.0.0.0/0 10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:585"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:590:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:590"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0
ACCEPT 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:590"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:594:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=home --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:594"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=home --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:594"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:595:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=home --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:595"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:595"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:596:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=home --remove-interface=dummy --remove-interface=dummy3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:596"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=home --remove-interface=dummy --remove-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:596"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:597:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=home --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:597"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=home --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:597"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:598:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:598"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:598"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:598:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:598"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:598"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:601:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-default-zone |grep public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:601"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-default-zone |grep public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:602:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-interface dummy4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:602"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-interface dummy4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:602"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:603:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:603"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:603"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:611:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:611"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:611"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:614:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:614"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:614"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:619:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:619"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:619"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:620:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=1234::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:620"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=1234::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:620"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:623:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:623"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:623"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:632:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_internal_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:632"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_internal_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:632"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:635:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_internal_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:635"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_internal_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 1234::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:635"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:638:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=1234::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:638"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=1234::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:638"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:648:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_internal_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:648"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_internal_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:648"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:651:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_internal_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:651"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_internal_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:651"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:653:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.20.20.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:653"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.20.20.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:653"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:654:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=4321::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:654"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=4321::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:654"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:666:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_internal_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:666"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_internal_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 10.10.10.0/24
ACCEPT 0 -- 0.0.0.0/0 10.20.20.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:666"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:670:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_internal_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:670"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_internal_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 4321::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:670"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:673:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:673"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:673"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:680:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_internal_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:680"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_internal_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:680"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:682:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_internal_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:682"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_internal_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:682"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi







        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:684" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:684"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_219
#AT_START_220
at_fn_group_banner 220 'firewall-cmd.at:686' \
  "forward ports" "                                  " 8
at_xfail=no
(
  $as_echo "220. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:686: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:686"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:686"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:686: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:686"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:686"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:686: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:686"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:686"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:686: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:686"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:686"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:686" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:686"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:686" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:686"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:686" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:686"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:686" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:686"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:689"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:690:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=11:proto=tcp:toport=22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:690"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:690"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:699:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:699"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:11 to::22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:699"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:702:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:702"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:702"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:704:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:704"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:704"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:705:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4444 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:705"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:705"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:706:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:706"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:706"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:715:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:715"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:33 to:4.4.4.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:715"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:718:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:718"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:718"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:720:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:720"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:720"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:721:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:721"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:721"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:722:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:722"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:722"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:723:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:723"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:723"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:724:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:724"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:724"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:725:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:725"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:725"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:726:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:726"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:726"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:727:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:727"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:727"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:728:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:728"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:728"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:729:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:729"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:729"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:729:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:729"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:729"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:729:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:729"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT 132 -- ::/0 ::/0 sctp dpt:66 to:[fd00:dead:beef:ff0::]:66
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:729"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:729:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:729"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:729"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:729:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:729"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:729"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:729:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:729"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:729"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:748:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:748"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:748"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:749:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:749"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:749"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:750:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:750"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:750"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:751:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:751"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:751"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:752:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:752"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:752"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:753:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:753"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:753"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:754:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-forward-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:754"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:754"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:756"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:757:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=11:proto=tcp:toport=22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:757"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:757"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:758:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:758"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:758"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4444 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:759"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:760:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:760"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:760"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:761:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:761"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:761"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:762:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:762"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:762"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:763:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:763"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:763"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:764:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:764"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:764"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:765:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:765"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:765"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:766:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:766"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:766"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:767:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:767"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:767"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:768:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:768"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:768"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:769:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:769"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:769"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:770"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:770"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:770"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:770"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:776:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:776"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:776"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:777:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:777"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:777"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:778:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:778"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:778"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:779:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:779"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:779"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:780"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:781:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:781"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:781"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:782:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-forward-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:782"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:782"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:783" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:783"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_220
#AT_START_221
at_fn_group_banner 221 'firewall-cmd.at:785' \
  "ICMP block" "                                     " 8
at_xfail=no
(
  $as_echo "221. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:785"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:785"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:785"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:785"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:785" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:785"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:785" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:785"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:785" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:785"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:785" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:785"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-icmp-blocks "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:788"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-icmp-blocks
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:790:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=dummyblock "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:790"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:790"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:791:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:791"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:791"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:792:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:792"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:792"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:793:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --remove-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:793"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:793"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:794:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:794"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:794"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:795:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=dummyblock "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:795"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:795"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:796:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:796"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:796"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:797:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:797"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:797"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:798:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --remove-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:798"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:798"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:799:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:799"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:799"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:801:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:801"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:801"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:802:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:802"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:802"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:803:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:803"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:803"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:804"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:805:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-icmp-block-inversion --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:805"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:805"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:806:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:806"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:806"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:807:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:807"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:807"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:808:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:808"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:808"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:810:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=block "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:810"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=block
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:810"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:811:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=block "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:811"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=block
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:811"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:812:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=drop "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:812"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=drop
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:812"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:813:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=drop "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:813"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=drop
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:813"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:814:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=trusted "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:814"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:814"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:815:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=trusted "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:815"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:815"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:817:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:817"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:817"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:818:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:818"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:818"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:819:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:819"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:819"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:820:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:820"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:820"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:821:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:821"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:821"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:822:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:822"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:823:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:823"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:823"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:824:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:824"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:824"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:825:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:825"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:825"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:826:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:826"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:826"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:827:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:827"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:827"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:828:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:828"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:828"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_ICMPTYPE:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:829" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ICMPTYPE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:829"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_221
#AT_START_222
at_fn_group_banner 222 'firewall-cmd.at:831' \
  "user ICMP types" "                                " 8
at_xfail=no
(
  $as_echo "222. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:831"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:831"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:831"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:831"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:831" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:831"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:831" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:831"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:831" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:831"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:831" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:831"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:834:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-icmptype=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:834"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-icmptype=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:834"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:836:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-icmptype=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:836"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:836"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:837:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-icmptypes | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:837"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-icmptypes | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:837"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:839:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv5 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:839"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:839"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:840:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:840"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:840"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:841:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:841"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:841"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:842:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:842"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:842"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:843:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:843"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:843"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:844:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:844"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:844"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:845:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:845"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:845"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:847:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-icmp-block=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:847"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-icmp-block=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:847"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:848:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:848"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:848"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:850:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-icmptype=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:850"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:850"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:851:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:851"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:851"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/NAME_CONFLICT: new_icmptype():/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:852" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/NAME_CONFLICT: new_icmptype():/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:852"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_222
#AT_START_223
at_fn_group_banner 223 'firewall-cmd.at:854' \
  "ipset" "                                          " 8
at_xfail=no
(
  $as_echo "223. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:854"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:854"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:854"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:854"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:854" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:854"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:854" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:854"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:854" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:854"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:854" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:854"









        $as_echo "firewall-cmd.at:857" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPSET -h >/dev/null 2>&1  ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:857"






        $as_echo "firewall-cmd.at:858" >"$at_check_line_file"
(! $IPSET --help | grep "hash:mac") \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:858"
        $as_echo "firewall-cmd.at:858" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPSET create foobar hash:mac >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:858"

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:858:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IPSET destroy foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:858"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPSET destroy foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:858"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:860:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:860"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:860"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:861:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:861"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:861"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:862:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:862"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:862"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:864:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:864"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:864"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:865:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries | grep \"1.2.3.4\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:865"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries | grep "1.2.3.4"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:865"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:866:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.400 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:866"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.400
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/firewall-cmd.at:866"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:867:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --remove-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:867"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --remove-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:867"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:868:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:868"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:868"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:871:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:871"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:871"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:872:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=ipset:foobar | grep public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:872"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=ipset:foobar | grep public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:872"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:873:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources | grep \"ipset:foobar\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:873"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources | grep "ipset:foobar"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:873"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:874:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --query-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:874"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --query-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:874"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:875:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:875"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:875"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:876:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --query-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:876"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --query-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:876"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:878:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:878"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:878"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:879:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:879"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:879"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:882:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:882"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:882"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:883:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10-10.10.10.12,1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:883"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10-10.10.10.12,1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:883"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:884:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,2000-2100 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:884"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,2000-2100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:884"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:885:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:885"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:885"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:885:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:885"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:885"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:896:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,8080 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:896"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:896"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:897:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:897"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:897"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:898:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:898"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:898"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:898:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:898"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:898"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:901:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:901"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:901"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:902:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:902"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:902"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:903:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,udp:1000-1002 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:903"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,udp:1000-1002
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:903"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:904:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:904"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:904"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:904:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:904"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:904"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:905:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.20,8080 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:905"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.20,8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:905"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:906:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:906"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:906"
$at_failed && at_fn_log_failure
$at_traceon; }














        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:930:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:930"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip,port
Members:
10.10.10.10,sctp:1234
10.10.10.10,udp:1000
10.10.10.10,udp:1001
10.10.10.10,udp:1002
20.20.20.20,tcp:8080
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:930"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:940:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,sctp:8080 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:940"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,sctp:8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:940"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:941:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:941"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:941"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:942:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:942"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:942"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:942:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:942"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:942"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:945:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,mark "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:945"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,mark
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:945"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:946:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,0x100 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:946"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,0x100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:946"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.20,0x200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.20,0x200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }














        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:972:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:972"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip,mark
Members:
10.10.10.10,0x00000100
20.20.20.20,0x00000200
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:972"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:979:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:979"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:979"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:980:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:980"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:980"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:980:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:980"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:980"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:983:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:net,port "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:983"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:net,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:983"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:984:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.0/24,sctp:1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:984"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.0/24,sctp:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:984"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:985:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:985"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:985"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:985:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:985"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:985"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:986:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,tcp:8080 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:986"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,tcp:8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:986"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:987:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:987"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:987"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:988:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:988"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:988"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:988:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:988"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:988"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:991:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port,net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:991"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port,net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:991"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:992:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234,10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:992"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234,10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:992"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:993:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:993"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:993"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:993:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:993"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:993"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:994:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,tcp:8080,1.6.0.0/16 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:994"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,tcp:8080,1.6.0.0/16
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:994"
$at_failed && at_fn_log_failure
$at_traceon; }











        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1005:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1005"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip,port,net
Members:
1.2.3.4,tcp:8080,1.6.0.0/16
10.10.10.10,sctp:1234,10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1005"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1016:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:net,iface "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1016"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:net,iface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1016"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1017:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.0/24,foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1017"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.0/24,foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1017"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1018:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1018"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1018"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1018:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1018"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1018"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1019:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.0/24,raboof0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1019"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.0/24,raboof0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1019"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1020:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1020"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1020"
$at_failed && at_fn_log_failure
$at_traceon; }














        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1043:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1043"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net,iface
Members:
10.10.10.0/24,foobar0
20.20.20.0/24,raboof0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1043"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1050:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1050"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1050"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1051:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1051"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1051"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1051:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1051"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1051"
$at_failed && at_fn_log_failure
$at_traceon; }










    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:mac "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1053"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:mac
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=12:34:56:78:90:ab "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1053"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=12:34:56:78:90:ab
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1053"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1053"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=12:34:56:78:90:ac "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1053"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=12:34:56:78:90:ac
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1053"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1053"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1053:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1053"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1053"
$at_failed && at_fn_log_failure
$at_traceon; }






    else
        :

    fi





        if test x"-e '/ERROR: INVALID_ENTRY: invalid address/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1061" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ENTRY: invalid address/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1061"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_223
#AT_START_224
at_fn_group_banner 224 'firewall-cmd.at:1063' \
  "user helpers" "                                   " 8
at_xfail=no
(
  $as_echo "224. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1063: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1063"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1063"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1063: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1063"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1063"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1063: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1063"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1063"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1063: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1063"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1063"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1063" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1063"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1063" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1063"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1063" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1063"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1063" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1063"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1066:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-helper=foobar --module=foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1066"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-helper=foobar --module=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 132 $at_status "$at_srcdir/firewall-cmd.at:1066"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1067:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-helper=foobar --module=nf_conntrack_foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1067"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-helper=foobar --module=nf_conntrack_foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1067"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1068:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-helpers | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1068"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1068"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1069:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family | grep ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1069"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1069"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1070:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=ipv5 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1070"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1070"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1071:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1071"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1071"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1072:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family | grep ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1072"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1072"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1073:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family= "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1073"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1073"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1075:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1075"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1075"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1077:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1077"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1077"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1080:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --add-port=44/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1080"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --add-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1080"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1081:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports | grep 44 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1081"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports | grep 44
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1081"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1082:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --query-port=44/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1082"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1083:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --remove-port=44/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1083"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --remove-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1083"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1084:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --query-port=44/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1084"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1084"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1085:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1085"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1085"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1087:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-helper=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1087"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-helper=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1087"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1088:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-helpers | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1088"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1088"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_MODULE:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1089" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_MODULE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1089"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_224
#AT_START_225
at_fn_group_banner 225 'firewall-cmd.at:1091' \
  "direct" "                                         " 8
at_xfail=no
(
  $as_echo "225. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1091: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1091"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1091"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1091: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1091"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1091"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1091: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1091"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1091"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1091: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1091"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1091"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1091" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1091"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1091" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1091"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1091" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1091"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1091" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1091"






        $as_echo "firewall-cmd.at:1093" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1093"






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1095:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-chain ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1095"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1095"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1096:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-chains ipv4 filter | grep mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1096"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-chains ipv4 filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1096"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1097:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-chains | grep \"ipv4 filter mychain\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1097"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-chains | grep "ipv4 filter mychain"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1097"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1098:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-chain ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1098"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1098"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1099:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-chain ipv5 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1099"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-chain ipv5 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1099"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-chain ipv4 badtable mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-chain ipv4 badtable mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:1100"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules | grep \"ipv4 filter mychain 3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules | grep "ipv4 filter mychain 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1105"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1106"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1107"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv5 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv5 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1108"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 badtable mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 badtable mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:1109"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1111"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"3 -s 192.168.1.1 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "3 -s 192.168.1.1 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"4 -s 192.168.1.2 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "4 -s 192.168.1.2 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"5 -s 192.168.1.3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "5 -s 192.168.1.3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1117"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"6 -s 192.168.1.4 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "6 -s 192.168.1.4 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rules ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rules ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1119"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1120"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1121"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1122"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1123"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-chain ipv5 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-chain ipv5 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1125"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1126:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 badtable mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1126"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 badtable mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:1126"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1127"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-chain ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1128"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1129:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 filter dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1129"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 filter dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1129"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1132"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --list-all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1133"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1135"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1136:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --zone=home --list-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1136"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --zone=home --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1136"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --permanent --list-all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --permanent --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1137"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-chain ipv4 filter žluťoučký "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1140"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-chains ipv4 filter |grep \"žluťoučký\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-chains ipv4 filter |grep "žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1141"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-chains | grep \"ipv4 filter žluťoučký\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-chains | grep "ipv4 filter žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1142"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1143"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1144:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1144"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1144"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1145"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 filter žluťoučký 3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 filter žluťoučký 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1146"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1147"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1148:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1148"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1148"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1149"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-chain ipv4 filter žluťoučký "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1150"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1151:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1151"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1151"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1154:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1154"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1154"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1155:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter FORWARD_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1155"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter FORWARD_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1155"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1156:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 security INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1156"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 security INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1156"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1157:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 raw PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1157"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 raw PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1157"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1158:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 mangle PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1158"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 mangle PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1158"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1159:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 nat PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1159"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 nat PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1159"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1160:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1160"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1160"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1161"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1161"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1162" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1162"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_225
#AT_START_226
at_fn_group_banner 226 'firewall-cmd.at:1165' \
  "direct nat" "                                     " 8
at_xfail=no
(
  $as_echo "226. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1165: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1165"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1165"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1165: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1165"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1165"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1165: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1165"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1165"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1165: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1165"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1165"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1165" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1165"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1165" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1165"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1165" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1165"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1165" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1165"







        $as_echo "firewall-cmd.at:1168" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1168"











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1173"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1174"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1175"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1176"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1177:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1177"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1177"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1178:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1178"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1178"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1179:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1179"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1179"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1180:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1180"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1180"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1181:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules |grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1181"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules |grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1181"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1182:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1182"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1182"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1183:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1183"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1183"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1184:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1184"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1184"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1185:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1185"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1185"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:1188" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1188"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_226
#AT_START_227
at_fn_group_banner 227 'firewall-cmd.at:1190' \
  "direct passthrough" "                             " 8
at_xfail=no
(
  $as_echo "227. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1190: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1190"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1190"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1190: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1190"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1190"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1190: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1190"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1190"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1190: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1190"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1190"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1190" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1190"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1190" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1190"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1190" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1190"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1190" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1190"






        $as_echo "firewall-cmd.at:1192" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1192"






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1194:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 --table mangle --append POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1194"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 --table mangle --append POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1194"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1195:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 --table mangle --delete POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1195"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 --table mangle --delete POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1195"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1197:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1197"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1197"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1198:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1198"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1198"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1199:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1199"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1199"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1200:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1200"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1200"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1201:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1201"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1201"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1202:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1202"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1202"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1203:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1203"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1203"
$at_failed && at_fn_log_failure
$at_traceon; }






    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1205:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-passthrough ipv6 --table filter --append FORWARD --destination fd00:dead:beef:ff0::/64 --in-interface dummy0 --out-interface dummy0 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1205"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-passthrough ipv6 --table filter --append FORWARD --destination fd00:dead:beef:ff0::/64 --in-interface dummy0 --out-interface dummy0 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1205"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1205:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-passthroughs ipv6 | grep \"fd00:dead:beef:ff0::/64\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1205"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-passthroughs ipv6 | grep "fd00:dead:beef:ff0::/64"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1205"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1205:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-passthroughs | grep \"fd00:dead:beef:ff0::/64\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1205"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-passthroughs | grep "fd00:dead:beef:ff0::/64"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1205"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1205:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -nvL | grep \"fd00:dead:beef:ff0::/64\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1205"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -nvL | grep "fd00:dead:beef:ff0::/64"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1205"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1205:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv6 --table filter --delete FORWARD --destination fd00:dead:beef:ff0::/64 --in-interface dummy0 --out-interface dummy0 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1205"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv6 --table filter --delete FORWARD --destination fd00:dead:beef:ff0::/64 --in-interface dummy0 --out-interface dummy0 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1205"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv5 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1214"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough --get-chains ipv4 filter "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough --get-chains ipv4 filter
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1216"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1218:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1218"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1218"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1219:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv5 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1219"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1219"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1220:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv4 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1220"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1220"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1221:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-passthroughs ipv4 | grep \"[-]nvL\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1221"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-passthroughs ipv4 | grep "[-]nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1221"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1222:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-passthroughs | grep \"ipv4 [-]nvL\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1222"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-passthroughs | grep "ipv4 [-]nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1222"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1223"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1224:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-passthrough ipv4 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1224"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1224"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1225:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1225"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1225"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/WARNING: NOT_ENABLED: passthrough/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1226" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/WARNING: NOT_ENABLED: passthrough/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1226"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_227
#AT_START_228
at_fn_group_banner 228 'firewall-cmd.at:1228' \
  "direct ebtables" "                                " 8
at_xfail=no
(
  $as_echo "228. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1228: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1228"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1228"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1228: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1228"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1228"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1228: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1228"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1228"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1228: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1228"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1228"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1228" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1228"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1228" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1228"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1228" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1228"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1228" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1228"






        $as_echo "firewall-cmd.at:1230" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1230"






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-chain eb filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1232"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1233:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-chains eb filter | grep mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1233"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1233"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1234"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule eb filter mychain 999 -p IPv6 --ip6-protocol UDP --ip6-source-port ! 12345 -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule eb filter mychain 999 -p IPv6 --ip6-protocol UDP --ip6-source-port ! 12345 -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1235"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-p IPv6 --ip6-proto udp ! --ip6-sport 12345 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1236"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1241:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1241"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1241"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1242:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1242"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 --ip6-proto udp ! --ip6-sport 12345 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1242"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1247:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule eb filter INPUT 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1247"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule eb filter INPUT 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1247"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1248:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule eb filter INPUT_direct 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1248"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule eb filter INPUT_direct 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1248"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L INPUT_direct; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L INPUT_direct; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-p IPv6 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1249"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1261:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rules eb filter INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1261"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rules eb filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1261"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1262:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rules eb filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1262"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rules eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1262"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1264:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-chain eb filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1264"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1264"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1265:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-chains eb filter | grep mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1265"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1265"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1266:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1266"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1266"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1267"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1267"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$EBTABLES --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $EBTABLES --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1268"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:1272" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1272"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_228
#AT_START_229
at_fn_group_banner 229 'firewall-cmd.at:1274' \
  "lockdown" "                                       " 8
at_xfail=no
(
  $as_echo "229. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1274: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1274"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1274"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1274: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1274"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1274"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1274: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1274"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1274"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1274: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1274"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1274"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1274" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1274"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1274" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1274"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1274" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1274"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1274" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1274"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1277"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1278:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1278"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1278"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-lockdown-whitelist-commands | grep \"/usr/bin/command\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1279"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1280"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1281:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1281"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1281"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1282"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1283"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1284:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-commands | grep \"/usr/bin/command\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1284"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1284"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1285"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1286"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1288:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1288"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1288"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1289:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1289"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1289"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1290"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1291"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1292"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1293"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1294:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1294"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1294"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1295"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1296"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1297:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1297"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1297"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1299"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1300"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1301:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-lockdown-whitelist-uids | grep \"6666\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1301"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1301"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1302:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1302"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1302"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1303:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1303"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1303"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1304:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-uid 6666x "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1304"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1304"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1305:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1305"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1305"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1306:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1306"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1306"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-uids | grep \"6666\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1307"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1308:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1308"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1308"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1309:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1309"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1309"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1310:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-uid 6666x "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1310"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1310"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1312:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1312"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1312"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1313:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1313"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1313"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1314:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-lockdown-whitelist-users | grep \"theboss\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1314"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1314"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1315:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1315"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1315"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1316:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1316"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1316"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1317:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1317"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1317"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1318:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1318"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1318"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1319:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-users | grep \"theboss\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1319"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1319"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1320:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1320"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1320"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1321:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1321"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1321"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "firewall-cmd.at:1323" >"$at_check_line_file"
(test `whoami` != 'root') \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1323"



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1324:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-user root "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1324"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-user root
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1324"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1325:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --lockdown-on "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1325"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --lockdown-on
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1325"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1326:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1326"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1326"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1327:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --lockdown-off "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1327"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --lockdown-off
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1327"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1328:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1328"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1328"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:1329" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1329"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_229
#AT_START_230
at_fn_group_banner 230 'firewall-cmd.at:1341' \
  "rich rules good" "                                " 8
at_xfail=no
(
  $as_echo "230. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1341: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1341"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1341"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1341: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1341"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1341"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1341: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1341"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1341"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1341: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1341"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1341"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1341" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1341"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1341" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1341"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1341" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1341"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1341" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1341"









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1344"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1345"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"igmp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"igmp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value=\"igmp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"igmp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"igmp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"igmp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"igmp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"igmp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="igmp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1347"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"irc\" nflog prefix=\"irc: \" group=1000 queue-size=10 limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="irc" nflog prefix="irc: " group=1000 queue-size=10 limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"mysql\" nflog prefix=\"mysql: \" queue-size=100 limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="mysql" nflog prefix="mysql: " queue-size=100 limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"2222\" protocol=\"tcp\" nflog prefix=\"port-2222: \" queue-size=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="2222" protocol="tcp" nflog prefix="port-2222: " queue-size=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"3333\" protocol=\"udp\" nflog prefix=\"port-3333: \" queue-size=65535 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="3333" protocol="udp" nflog prefix="port-3333: " queue-size=65535 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }









    if $IP6TABLES -L >/dev/null 2>&1; then
        :





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }






    else
        :

    fi







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1362"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1363"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1366"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }









    if $IP6TABLES -L >/dev/null 2>&1; then
        :





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }






    else
        :

    fi







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1373"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1374" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1374"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_230
#AT_START_231
at_fn_group_banner 231 'firewall-cmd.at:1375' \
  "rich rules audit" "                               " 8
at_xfail=no
(
  $as_echo "231. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1375: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1375"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1375"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1375: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1375"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1375"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1375: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1375"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1375"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1375: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1375"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1375"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1375" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1375"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1375" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1375"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1375" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1375"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1375" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1375"












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1379"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:1380" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1380"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_231
#AT_START_232
at_fn_group_banner 232 'firewall-cmd.at:1383' \
  "rich rules priority" "                            " 8
at_xfail=no
(
  $as_echo "232. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1383: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1383"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1383"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1383: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1383"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1383"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1383: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1383"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1383"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1383: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1383"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1383"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1383" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1383"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1383" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1383"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1383" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1383"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1383" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1383"




















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1412:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1412"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_public_pre 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public_log 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public_deny 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public_allow 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public_post 0 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 1 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1412"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1420:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_public; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1420"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_public; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_public_pre 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_public_log 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_public_deny 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_public_allow 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_public_post 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1420"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1427:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1427"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_public_pre 0 -- ::/0 ::/0
IN_public_log 0 -- ::/0 ::/0
IN_public_deny 0 -- ::/0 ::/0
IN_public_allow 0 -- ::/0 ::/0
IN_public_post 0 -- ::/0 ::/0
ACCEPT 58 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1427"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1435:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_public; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1435"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_public; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_public_pre 0 -- ::/0 ::/0
FWD_public_log 0 -- ::/0 ::/0
FWD_public_deny 0 -- ::/0 ::/0
FWD_public_allow 0 -- ::/0 ::/0
FWD_public_post 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1435"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1448:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule port port=\"1111\" protocol=\"tcp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1448"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule port port="1111" protocol="tcp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1448"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1449:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 port port=\"1122\" protocol=\"tcp\" audit accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1449"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 port port="1122" protocol="tcp" audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1449"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1450:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule port port=\"2222\" protocol=\"tcp\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1450"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule port port="2222" protocol="tcp" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1450"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1451:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule port port=\"3333\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1451"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule port port="3333" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1451"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 port port=\"4444\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 port port="4444" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1452"
$at_failed && at_fn_log_failure
$at_traceon; }


















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1479:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_log; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1479"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_log; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1111 LOG flags 0 level 4
AUDIT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1122 AUDIT accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1479"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1483:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1483"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2222
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1483"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1486:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1486"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1122
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:3333
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1486"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1492:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_log; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1492"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_log; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG 6 -- ::/0 ::/0 tcp dpt:1111 LOG flags 0 level 4
AUDIT 6 -- ::/0 ::/0 tcp dpt:1122 AUDIT accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1492"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1496:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1496"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP 6 -- ::/0 ::/0 tcp dpt:2222
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1496"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1499:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1499"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:22
ACCEPT 17 -- ::/0 fe80::/64 udp dpt:546
ACCEPT 6 -- ::/0 ::/0 tcp dpt:1122
ACCEPT 6 -- ::/0 ::/0 tcp dpt:3333
ACCEPT 6 -- ::/0 ::/0 tcp dpt:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1499"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1506:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1506"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1506"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1506:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1506"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1506"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1509:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-32768 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1509"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-32768 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1509"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1510:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=32767 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1510"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=32767 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1510"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1511:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-32769 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1511"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-32769 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/firewall-cmd.at:1511"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1512:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=32768 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1512"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=32768 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/firewall-cmd.at:1512"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1513"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1513"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1517"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1518:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1518"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1518"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1526:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_post; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1526"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_post; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1526"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1529:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_post; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1529"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_post; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1529"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1532:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1532"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1532"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1533:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1533"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1533"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1534:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1534"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1534"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1535:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1535"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1535"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1536:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1536"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1536"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1537:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1537"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1537"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1540:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1540"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1540"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1541:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1541"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1541"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1542:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule log prefix=\"foobar: \"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1542"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule log prefix="foobar: "'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1542"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1543:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1543"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1543"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1543:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1543"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1543"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1546:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"10.10.0.0/16\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1546"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="10.10.0.0/16" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1546"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 source address=\"10.1.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 source address="10.1.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1547"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1548:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-1  source address=\"10.1.0.0/16\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1548"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-1  source address="10.1.0.0/16" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1548"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1550:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=0 forward-port port=\"222\"  protocol=\"tcp\" to-port=\"22\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1550"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=0 forward-port port="222"  protocol="tcp" to-port="22"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1550"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1551:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=0 forward-port port=\"2222\" protocol=\"tcp\" to-port=\"22\" to-addr=\"10.1.1.1\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1551"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=0 forward-port port="2222" protocol="tcp" to-port="22" to-addr="10.1.1.1"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1551"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1552:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 forward-port port=\"8888\" protocol=\"tcp\" to-port=\"80\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1552"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 forward-port port="8888" protocol="tcp" to-port="80"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1552"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1553:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 forward-port port=\"8080\" protocol=\"tcp\" to-port=\"80\" to-addr=\"10.1.1.1\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1553"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 forward-port port="8080" protocol="tcp" to-port="80" to-addr="10.1.1.1"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1553"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1554:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" priority=0 forward-port port=\"9090\" protocol=\"tcp\" to-port=\"90\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1554"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" priority=0 forward-port port="9090" protocol="tcp" to-port="90"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1554"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1554:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" priority=-123 forward-port port=\"999\" protocol=\"tcp\" to-port=\"99\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1554"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" priority=-123 forward-port port="999" protocol="tcp" to-port="99"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1554"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1554:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" priority=-123 forward-port port=\"9999\" protocol=\"tcp\" to-port=\"9999\" to-addr=\"1234::4321\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1554"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" priority=-123 forward-port port="9999" protocol="tcp" to-port="9999" to-addr="1234::4321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1554"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi









































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1643:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1643"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP 0 -- 10.1.0.0/16 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1643"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1646:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1646"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1646"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1649:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_public_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1649"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_public_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1649"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1651:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1651"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1651"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1653:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PRE_public_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1653"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PRE_public_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8888 to::80
DNAT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8080 to:10.1.1.1:80
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1653"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1657:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1657"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:222 to::22
DNAT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2222 to:10.1.1.1:22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1657"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1661:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POST_public_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1661"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POST_public_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MASQUERADE 0 -- 10.1.1.0/24 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1661"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1664:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POST_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1664"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POST_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MASQUERADE 0 -- 10.10.0.0/16 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1664"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1667:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PRE_public_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1667"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PRE_public_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1667"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1669"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1671:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1671"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1671"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1673:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1673"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:22
ACCEPT 17 -- ::/0 fe80::/64 udp dpt:546
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1673"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1677:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_public_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1677"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_public_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1677"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1679:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1679"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1679"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1681:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PRE_public_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1681"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PRE_public_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT 6 -- ::/0 ::/0 tcp dpt:999 to::99
DNAT 6 -- ::/0 ::/0 tcp dpt:9999 to:[1234::4321]:9999
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1681"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1685:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1685"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT 6 -- ::/0 ::/0 tcp dpt:9090 to::90
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1685"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1688:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PRE_public_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1688"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PRE_public_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1688"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1690:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1690"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1690"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1692:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1692"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1692"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1692:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1692"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1692"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1695:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule icmp-block name=\"destination-unreachable\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1695"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule icmp-block name="destination-unreachable"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1695"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1696:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10 icmp-block name=\"destination-unreachable\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1696"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10 icmp-block name="destination-unreachable"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1696"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1698:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1698"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1698"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1699:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10 icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1699"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10 icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1699"
$at_failed && at_fn_log_failure
$at_traceon; }



























    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1746:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1746"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 reject-with icmp-host-prohibited
ACCEPT 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1746"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1750:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1750"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1750"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1753:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1753"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1753"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1757:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_public_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1757"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_public_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1757"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1759:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_public_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1759"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_public_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1759"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1761:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1761"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1761"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1763:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1763"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT 58 -- ::/0 ::/0 ipv6-icmptype 1 reject-with icmp6-adm-prohibited
ACCEPT 58 -- ::/0 ::/0 ipv6-icmptype 128
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1763"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1767:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1767"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT 58 -- ::/0 ::/0 ipv6-icmptype 1 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1767"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1770:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1770"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:22
ACCEPT 17 -- ::/0 fe80::/64 udp dpt:546
ACCEPT 58 -- ::/0 ::/0 ipv6-icmptype 128
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1770"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1775:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_public_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1775"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_public_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1775"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1777:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_public_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1777"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_public_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1777"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1779:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1779"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1779"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1781:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1781"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1781"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1781:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1781"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1781"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1784:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=70   service name=\"smtps\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1784"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=70   service name="smtps" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1784"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1785:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-111 service name=\"ntp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1785"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-111 service name="ntp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1785"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1786:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10  port port=\"1111\" protocol=\"tcp\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1786"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10  port port="1111" protocol="tcp" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1786"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1787:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-100 port port=\"1111\" protocol=\"tcp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1787"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-100 port port="1111" protocol="tcp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1787"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1788:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=\"-77\"    service name=\"smtp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1788"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority="-77"    service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1788"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1789:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=-111 service name=\"ntp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1789"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=-111 service name="ntp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1789"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1790:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-32768 source address=\"10.0.0.0/8\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1790"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-32768 source address="10.0.0.0/8" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1790"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1791:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-2 source address=\"10.0.0.0/8\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1791"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-2 source address="10.0.0.0/8" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1791"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1792:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-1 source address=\"10.0.0.0/8\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1792"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-1 source address="10.0.0.0/8" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1792"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1793:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-5 source address=\"10.10.10.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1793"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-5 source address="10.10.10.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1793"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1794:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-3 source address=\"10.100.100.0/24\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1794"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-3 source address="10.100.100.0/24" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1794"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1795:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=127  drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1795"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=127  drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1795"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1796:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=125 service name=\"imap\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1796"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=125 service name="imap" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1796"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1797:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=126 log prefix=\"DROPPED: \"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1797"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=126 log prefix="DROPPED: "'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1797"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1798:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=10  service name=\"ssh\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1798"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=10  service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1798"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1799:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=1   service name=\"http\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1799"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=1   service name="http" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1799"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1800:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=100 service name=\"https\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1800"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=100 service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1800"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1801:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=5   service name=\"https\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1801"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=5   service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1801"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1802:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=66  service name=\"smtp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1802"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=66  service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1802"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1803:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=66    service name=\"smtp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1803"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=66    service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1803"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=70    service name=\"smtps\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=70    service name="smtps" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1804"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1805:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=5     service name=\"https\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1805"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=5     service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1805"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1806:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=\"-77\" service name=\"smtp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1806"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority="-77" service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1806"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1807:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" priority=-3 source address=\"10.100.100.0/24\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1807"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" priority=-3 source address="10.100.100.0/24" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1807"
$at_failed && at_fn_log_failure
$at_traceon; }
























    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1852:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1852"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG 0 -- 10.0.0.0/8 0.0.0.0/0 LOG flags 0 level 4
LOG 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1111 LOG flags 0 level 4
DROP 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1111
ACCEPT 0 -- 10.10.10.0/24 0.0.0.0/0
LOG 0 -- 10.0.0.0/8 0.0.0.0/0 LOG flags 0 level 4
DROP 0 -- 10.0.0.0/8 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1852"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1860:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1860"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1860"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1863:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1863"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1863"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1865:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_log; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1865"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_log; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1865"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1867:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_post; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1867"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_post; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:143
LOG 0 -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix \"DROPPED: \"
DROP 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1867"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1875:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1875"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG 6 -- ::/0 ::/0 tcp dpt:1111 LOG flags 0 level 4
DROP 6 -- ::/0 ::/0 tcp dpt:1111
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1875"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1879:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1879"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:22
ACCEPT 17 -- ::/0 fe80::/64 udp dpt:546
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1879"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1883:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1883"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1883"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1885:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_log; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1885"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_log; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1885"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1887:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_post; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1887"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_post; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:80
ACCEPT 6 -- ::/0 ::/0 tcp dpt:22
ACCEPT 6 -- ::/0 ::/0 tcp dpt:443
ACCEPT 6 -- ::/0 ::/0 tcp dpt:143
LOG 0 -- ::/0 ::/0 LOG flags 0 level 4 prefix \"DROPPED: \"
DROP 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1887"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1895:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1895"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1895"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1896:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1896"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1896"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1896:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1896"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1896"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1900:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 service name=\"http\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1900"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 service name="http" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1900"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1901:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1901"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public (default, active)
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule priority=\"-32768\" family=\"ipv4\" source address=\"10.0.0.0/8\" log
rule priority=\"-100\" port port=\"1111\" protocol=\"tcp\" log
rule priority=\"-10\" port port=\"1111\" protocol=\"tcp\" drop
rule priority=\"-5\" family=\"ipv4\" source address=\"10.10.10.0/24\" accept
rule priority=\"-2\" family=\"ipv4\" source address=\"10.0.0.0/8\" log
rule priority=\"-1\" family=\"ipv4\" source address=\"10.0.0.0/8\" drop
rule service name=\"http\" accept
rule priority=\"1\" service name=\"http\" accept
rule priority=\"10\" service name=\"ssh\" accept
rule priority=\"100\" service name=\"https\" accept
rule priority=\"125\" service name=\"imap\" accept
rule priority=\"126\" log prefix=\"DROPPED: \"
rule priority=\"127\" drop
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1901"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d'              -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1933" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d'              -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1933"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_232
#AT_START_233
at_fn_group_banner 233 'firewall-cmd.at:1938' \
  "rich rules bad" "                                 " 8
at_xfail=no
(
  $as_echo "233. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1938: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1938"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1938"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1938: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1938"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1938"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1938: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1938"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1938"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1938: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1938"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1938"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1938" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1938"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1938" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1938"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1938" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1938"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1938" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1938"










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1945:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1945"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1945"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1945:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1945"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1945"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1946:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='name=\"dns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1946"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1946"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1946:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='name=\"dns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1946"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1946"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1947"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1948"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1949"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1950"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule bad_element' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule bad_element' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1951"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv5\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1952"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv5\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1952"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule name=\"dns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1953"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule name=\"dns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1953"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol=\"ah\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol=\"ah\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1954"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1955:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"ah\" accept drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1955"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1955"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1955:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" accept drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1955"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1955"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1956:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1956"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1956"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1956:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1956"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1956"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1957:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule service bad_attribute=\"dns\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1957"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1957"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1957:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service bad_attribute=\"dns\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1957"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1957"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1958"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='family=\"ipv6\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='family="ipv6" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='family=\"ipv6\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='family="ipv6" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 207 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 207 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 123 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 123 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"esp\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1964"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"esp\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1964"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1965:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" masquerade drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1965"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1965"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1965:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" masquerade drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1965"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1965"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1966:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1966"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1966"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1966:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1966"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1966"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1967:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1967"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1967"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1967:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1967"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1967"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1968:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule service name=\"ssh\" log prefix=\"RRClag4hrBx9XZXk+46c6QavQehyRGdy3tjs7gzc+xfSzsd2smjoQ2NCPami6zVyjHtPGziBuqSWT0KII7QbHkwjNMr9pzbcbPue9PMTb5zXlMPphDjeuDdC3QTCH9rGQHooa9LiDWr+DqNPkBs+vb8r50eb+yEQIyhQaiDrQ0sc\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1968"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule service name="ssh" log prefix="RRClag4hrBx9XZXk+46c6QavQehyRGdy3tjs7gzc+xfSzsd2smjoQ2NCPami6zVyjHtPGziBuqSWT0KII7QbHkwjNMr9pzbcbPue9PMTb5zXlMPphDjeuDdC3QTCH9rGQHooa9LiDWr+DqNPkBs+vb8r50eb+yEQIyhQaiDrQ0sc" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 141 $at_status "$at_srcdir/firewall-cmd.at:1968"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1968:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name=\"ssh\" log prefix=\"RRClag4hrBx9XZXk+46c6QavQehyRGdy3tjs7gzc+xfSzsd2smjoQ2NCPami6zVyjHtPGziBuqSWT0KII7QbHkwjNMr9pzbcbPue9PMTb5zXlMPphDjeuDdC3QTCH9rGQHooa9LiDWr+DqNPkBs+vb8r50eb+yEQIyhQaiDrQ0sc\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1968"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name="ssh" log prefix="RRClag4hrBx9XZXk+46c6QavQehyRGdy3tjs7gzc+xfSzsd2smjoQ2NCPami6zVyjHtPGziBuqSWT0KII7QbHkwjNMr9pzbcbPue9PMTb5zXlMPphDjeuDdC3QTCH9rGQHooa9LiDWr+DqNPkBs+vb8r50eb+yEQIyhQaiDrQ0sc" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 141 $at_status "$at_srcdir/firewall-cmd.at:1968"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1969:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"sctp\" nflog group=-1 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1969"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="sctp" nflog group=-1 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 142 $at_status "$at_srcdir/firewall-cmd.at:1969"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1969:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"sctp\" nflog group=-1 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1969"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="sctp" nflog group=-1 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 142 $at_status "$at_srcdir/firewall-cmd.at:1969"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1970:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" service name=\"https\" nflog queue-size=-1 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1970"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" service name="https" nflog queue-size=-1 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 143 $at_status "$at_srcdir/firewall-cmd.at:1970"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1970:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" service name=\"https\" nflog queue-size=-1 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1970"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" service name="https" nflog queue-size=-1 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 143 $at_status "$at_srcdir/firewall-cmd.at:1970"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1971:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" service name=\"https\" nflog queue-size=65536 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1971"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" service name="https" nflog queue-size=65536 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 143 $at_status "$at_srcdir/firewall-cmd.at:1971"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1971:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" service name=\"https\" nflog queue-size=65536 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1971"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" service name="https" nflog queue-size=65536 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 143 $at_status "$at_srcdir/firewall-cmd.at:1971"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d'               -e '/ERROR: INVALID_LOG_PREFIX:/d'               -e '/ERROR: INVALID_NFLOG_GROUP:/d'               -e '/ERROR: INVALID_NFLOG_QUEUE:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1973" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d'               -e '/ERROR: INVALID_LOG_PREFIX:/d'               -e '/ERROR: INVALID_NFLOG_GROUP:/d'               -e '/ERROR: INVALID_NFLOG_QUEUE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1973"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_233
#AT_START_234
at_fn_group_banner 234 'firewall-cmd.at:1981' \
  "config validation" "                              " 8
at_xfail=no
(
  $as_echo "234. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1981: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1981"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1981"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1981: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1981"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1981"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1981: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1981"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1981"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1981: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1981"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1981"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1981" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1981"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1981" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1981"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1981" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1981"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1981" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1981"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1985:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1985"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1985"
$at_failed && at_fn_log_failure
$at_traceon; }





        cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<rule ipv="ipv4" table="filter" chain="INPUT" priority="1">-j LOG</rule>
</direct>
_ATEOF

    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
<command name="/home/egarver/bin/python /usr/bin/firewall-config"/>
<selinux context="system_u:system_r:NetworkManager_t:s0"/>
<selinux context="system_u:system_r:virtd_t:s0-s0:c0.c1023"/>
<user id="0"/>
</whitelist>
_ATEOF





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2003:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2003"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2003"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2003:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2003"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2003"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2004:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2004"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2004"
$at_failed && at_fn_log_failure
$at_traceon; }






        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2009: cp ./firewalld.conf ./firewalld.conf.orig"
at_fn_check_prepare_trace "firewall-cmd.at:2009"
( $at_check_trace; cp ./firewalld.conf ./firewalld.conf.orig
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2009"
$at_failed && at_fn_log_failure
$at_traceon; }

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2010: echo \"SomeBogusField=yes\" >> ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:2010"
( $at_check_trace; echo "SomeBogusField=yes" >> ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2010"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2011"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2016: cp ./firewalld.conf.orig ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:2016"
( $at_check_trace; cp ./firewalld.conf.orig ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2016"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<chain table="filter" ipv="ipv7" chain="foobar"/>
</direct>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:2025"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<rule />
</direct>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2033:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2033"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2033"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2034: rm ./direct.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2034"
( $at_check_trace; rm ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2034"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <user uid="666"/>
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2043:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2043"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2043"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <uid id="666"/>
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2051:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2051"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2051"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <group name="foobar" />
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2059:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2059"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2059"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2060: rm ./lockdown-whitelist.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2060"
( $at_check_trace; rm ./lockdown-whitelist.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2060"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2063: mkdir -p ./ipsets"
at_fn_check_prepare_trace "firewall-cmd.at:2063"
( $at_check_trace; mkdir -p ./ipsets
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2063"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry>12:34:56:78:90</entry>
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2070:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2070"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2070"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry bogus_attr="bogus">12:34:56:78:90:ab</entry>
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2082:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2082"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2082"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:ip,bogus">
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2089:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2089"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 119 $at_status "$at_srcdir/firewall-cmd.at:2089"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2090: rm ./ipsets/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2090"
( $at_check_trace; rm ./ipsets/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2090"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2093: mkdir -p ./helpers"
at_fn_check_prepare_trace "firewall-cmd.at:2093"
( $at_check_trace; mkdir -p ./helpers
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2093"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper>
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2099:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2099"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2099"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv7" module="nf_conntrack_ftp">
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:2106"
$at_failed && at_fn_log_failure
$at_traceon; }









    if $IP6TABLES -L >/dev/null 2>&1; then
        :

    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv6" module="nf_conntrack_ftp">
<port protocol="aoeui" port="666" />
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2108"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2117: rm ./helpers/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2117"
( $at_check_trace; rm ./helpers/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2117"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2120: mkdir -p ./icmptypes"
at_fn_check_prepare_trace "firewall-cmd.at:2120"
( $at_check_trace; mkdir -p ./icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2120"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<bad_element />
<icmptype>
</icmptype>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2127"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<icmptype>
<destination unexpected_attr="foobar" />
</icmptype>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2135"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2136: rm ./icmptypes/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2136"
( $at_check_trace; rm ./icmptypes/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2136"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2139: mkdir -p ./services"
at_fn_check_prepare_trace "firewall-cmd.at:2139"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2139"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="aoeui" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2146"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol bad_attr="foo" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2154:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2154"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2154"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<bad_element />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2162:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2162"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2162"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<module module="bad_attr" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2170:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2170"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2170"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="aoeu" port="666" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2178:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2178"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2178"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="ssssssh" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2186:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2186"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:2186"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="22" />
<source-port protocol="tcp" port="sssssh" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2195:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2195"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:2195"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<destination ipv4="224.0.0.1" ipv7="1234" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2203:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2203"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2203"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2204: rm ./services/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2204"
( $at_check_trace; rm ./services/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2204"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2207: mkdir -p ./zones"
at_fn_check_prepare_trace "firewall-cmd.at:2207"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2207"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/firewall-cmd.at:2211"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<service name="bogus_service_name" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2219:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2219"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:2219"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port protocol="ipv4" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2227:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2227"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2227"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<protocol value="thisdoesnotexist" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2235"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-block invalid_attr=""/>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2243"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-type />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2251"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<masquerade value="true" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2259:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2259"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2259"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port port="666" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2267"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port protocol="sctppp" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2275"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="-1" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2283"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<interface />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2291"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2299"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<limit />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2314:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2314"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2314"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<accept>
<limit value="none" />
</accept>
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2327:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2327"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2327"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<service name="bitcoin" />
<log prefix="WtsDMDAMJvd24wejRBsImI2VSkBaAlo1h2TVgEmH5CpL1YjdCTnjO8mizyp4cBDNq9NXS6QAuRnq/vF5xsid1orzY4jKzaWhm5qrktZLi38jinLFixX97d5JcM9o5tSx9XwQyaHUJMmxcjKYrDQ2Pvo1KMgf4f7yDAcKJaoJiNYp" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2342:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2342"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2342"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<log level="super_critical" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2357:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2357"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2357"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<forward-port port="1234" protocol="tcp" to-port="4321" to-addr="10.0.0.1" />
<nflog group="65536" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2372:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2372"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2372"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<port port="1234" protocol="tcp" />
<nflog queue-size="-1" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2387:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2387"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2387"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<audit prefix="foobar" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2402:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2402"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2402"
$at_failed && at_fn_log_failure
$at_traceon; }









    if $IP6TABLES -L >/dev/null 2>&1; then
        :

    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv6">
<source address="10.0.0.1/24" />
<accept />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2404:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2404"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2404"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2420: rm ./zones/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2420"
( $at_check_trace; rm ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2420"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"-e '/ERROR:/d'              -e '/WARNING:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:2422" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR:/d'              -e '/WARNING:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:2422"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_234
#AT_START_235
at_fn_group_banner 235 'rhbz1514043.at:1' \
  "--set-log-denied does not zero config" "          " 9
at_xfail=no
(
  $as_echo "235. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1514043.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --set-log-denied=all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --set-log-denied=all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=public --add-service=samba "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=public --add-service=samba
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "services: dhcpv6-client samba ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
LOG 0 -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID LOG flags 0 level 4 prefix \"STATE_INVALID_DROP: \"
DROP 0 -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
INPUT_direct 0 -- 0.0.0.0/0 0.0.0.0/0
INPUT_POLICIES 0 -- 0.0.0.0/0 0.0.0.0/0
LOG 0 -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix \"FINAL_REJECT: \"
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
LOG 0 -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID LOG flags 0 level 4 prefix \"STATE_INVALID_DROP: \"
DROP 0 -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
FORWARD_direct 0 -- 0.0.0.0/0 0.0.0.0/0
FORWARD_POLICIES 0 -- 0.0.0.0/0 0.0.0.0/0
LOG 0 -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix \"FINAL_REJECT: \"
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT 0 -- ::/0 ::/0
LOG 0 -- ::/0 ::/0 ctstate INVALID LOG flags 0 level 4 prefix \"STATE_INVALID_DROP: \"
DROP 0 -- ::/0 ::/0 ctstate INVALID
INPUT_direct 0 -- ::/0 ::/0
INPUT_POLICIES 0 -- ::/0 ::/0
LOG 0 -- ::/0 ::/0 LOG flags 0 level 4 prefix \"FINAL_REJECT: \"
REJECT 0 -- ::/0 ::/0 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT 0 -- ::/0 ::/0
LOG 0 -- ::/0 ::/0 ctstate INVALID LOG flags 0 level 4 prefix \"STATE_INVALID_DROP: \"
DROP 0 -- ::/0 ::/0 ctstate INVALID
FORWARD_direct 0 -- ::/0 ::/0
RFC3964_IPv4 0 -- ::/0 ::/0
FORWARD_POLICIES 0 -- ::/0 ::/0
LOG 0 -- ::/0 ::/0 LOG flags 0 level 4 prefix \"FINAL_REJECT: \"
REJECT 0 -- ::/0 ::/0 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "rhbz1514043.at:84" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:84"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_235
#AT_START_236
at_fn_group_banner 236 'rhbz1498923.at:1' \
  "invalid direct rule causes reload error" "        " 9
at_xfail=no
(
  $as_echo "236. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1498923.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"






        $as_echo "rhbz1498923.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1498923.at:3"



{ set +x
$as_echo "$at_srcdir/rhbz1498923.at:6: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:6"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "no zone
" | \
  $at_diff - "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1498923.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/rhbz1498923.at:18: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:18"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 8080 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 8080 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 1 --a-bogus-flag "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 1 --a-bogus-flag
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --direct --add-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --direct --add-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1498923.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1498923.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "failed
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1498923.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:39: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --direct --remove-rule ipv4 filter INPUT 1 --a-bogus-flag"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --direct --remove-rule ipv4 filter INPUT 1 --a-bogus-flag" "rhbz1498923.at:39"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --direct --remove-rule ipv4 filter INPUT 1 --a-bogus-flag
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/.*a-bogus-flag.*/d'" != x"ignore"; then
            $as_echo "rhbz1498923.at:47" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/.*a-bogus-flag.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:47"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_236
#AT_START_237
at_fn_group_banner 237 'pr181.at:1' \
  "combined zones name length check" "               " 9
at_xfail=no
(
  $as_echo "237. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/pr181.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/pr181.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/pr181.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/pr181.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "pr181.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/pr181.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "pr181.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr181.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "pr181.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr181.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "pr181.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:1"





{ set +x
$as_echo "$at_srcdir/pr181.at:4: mkdir -p ./zones/foobar"
at_fn_check_prepare_trace "pr181.at:4"
( $at_check_trace; mkdir -p ./zones/foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/pr181.at:6: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:6"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:7: echo '<zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:7"
( $at_check_trace; echo '<zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:8: echo '<short>foobar</short>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:8"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:9: echo '<description>foobar desc</description>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:9"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:10: echo '<service name=\"ssh\"/>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:10"
( $at_check_trace; echo '<service name="ssh"/>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:11: echo '</zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:11"
( $at_check_trace; echo '</zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/pr181.at:13: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:13"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:14: echo '<zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:14"
( $at_check_trace; echo '<zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:15: echo '<short>foobar</short>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:15"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:16: echo '<description>foobar desc</description>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:16"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:17: echo '<service name=\"http\"/>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:17"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:18: echo '</zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:18"
( $at_check_trace; echo '</zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/pr181.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/pr181.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/pr181.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=foobar --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=foobar --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "services: http ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "pr181.at:24" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:24"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_237
#AT_START_238
at_fn_group_banner 238 'gh287.at:1' \
  "ICMP block inversion" "                           " 9
at_xfail=no
(
  $as_echo "238. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh287.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh287.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh287.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh287.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh287.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh287.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh287.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh287.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh287.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh287.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh287.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:1"





{ set +x
$as_echo "$at_srcdir/gh287.at:4: mkdir -p ./zones"
at_fn_check_prepare_trace "gh287.at:4"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:5: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:5"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:6: echo '<zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:6"
( $at_check_trace; echo '<zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:7: echo '<short>foobar</short>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:7"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:8: echo '<description>foobar desc</description>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:8"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:9: echo '<service name=\"http\"/>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:9"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:10: echo '<source address=\"172.16.0.0/12\" />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:10"
( $at_check_trace; echo '<source address="172.16.0.0/12" />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:11: echo '<icmp-block-inversion />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:11"
( $at_check_trace; echo '<icmp-block-inversion />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:12: echo '</zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:12"
( $at_check_trace; echo '</zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh287.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh287.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "gh287.at:15" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:15"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_238
#AT_START_239
at_fn_group_banner 239 'individual_calls.at:1' \
  "individual calls" "                               " 9
at_xfail=no
(
  $as_echo "239. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/individual_calls.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "individual_calls.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/individual_calls.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "individual_calls.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "individual_calls.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "individual_calls.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"





{ set +x
$as_echo "$at_srcdir/individual_calls.at:4: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:4"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/individual_calls.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/individual_calls.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "individual_calls.at:7" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:7"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_239
#AT_START_240
at_fn_group_banner 240 'rhbz1534571.at:3' \
  "rule deduplication" "                             " 9
at_xfail=no
(
  $as_echo "240. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:3"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:3"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1534571.at:3"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service nfs --add-service nfs3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service nfs --add-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-service nfs3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-service nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-service nfs --add-service nfs3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-service nfs --add-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-service nfs3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-service nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1534571.at:17" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_240
#AT_START_241
at_fn_group_banner 241 'gh290.at:1' \
  "invalid syntax in xml files" "                    " 9
at_xfail=no
(
  $as_echo "241. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh290.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh290.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh290.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh290.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh290.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh290.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh290.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:1"






        $as_echo "gh290.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh290.at:3"



{ set +x
$as_echo "$at_srcdir/gh290.at:6: mkdir -p ./zones"
at_fn_check_prepare_trace "gh290.at:6"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:7: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./direct.xml"
at_fn_check_prepare_trace "gh290.at:7"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:8: echo '<direct>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:8"
( $at_check_trace; echo '<direct>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:9: echo '<chain table=\"filter\" chain=\"some_chain_name\" ipv=\"ipv4\"/>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:9"
( $at_check_trace; echo '<chain table="filter" chain="some_chain_name" ipv="ipv4"/>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:10: echo '<rule table=\"filter\" chain=\"some_chain_name\" ipv=\"ipv4\" priority=\"1\">--destination 127.0.0.1 --jump RETURN' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:10"
( $at_check_trace; echo '<rule table="filter" chain="some_chain_name" ipv="ipv4" priority="1">--destination 127.0.0.1 --jump RETURN' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:12: echo '</direct>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:12"
( $at_check_trace; echo '</direct>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }




    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:14" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:14"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:14" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:14"



    { set +x
$as_echo "$at_srcdir/gh290.at:15: grep \"ERROR:.*mismatched tag\" ./firewalld.log"
at_fn_check_prepare_trace "gh290.at:15"
( $at_check_trace; grep "ERROR:.*mismatched tag" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"-e '/ERROR:.*mismatched tag.*/d'" != x"ignore"; then
            $as_echo "gh290.at:16" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR:.*mismatched tag.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:16"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_241
#AT_START_242
at_fn_group_banner 242 'gh290.at:19' \
  "invalid syntax in xml files" "                    " 9
at_xfail=no
(
  $as_echo "242. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh290.at:19: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:19"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh290.at:19: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh290.at:19"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh290.at:19: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:19"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh290.at:19: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:19"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh290.at:19" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh290.at:19"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh290.at:19" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:19"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:19" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:19"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:19" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:19"





{ set +x
$as_echo "$at_srcdir/gh290.at:23: mkdir -p ./zones"
at_fn_check_prepare_trace "gh290.at:23"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:24: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:24"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:25: echo '<zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:25"
( $at_check_trace; echo '<zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:26: echo '<short>foobar</short>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:26"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:28: echo '<port port=\"22\" />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:28"
( $at_check_trace; echo '<port port="22" />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:29: echo '<service name=\"http\"/>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:29"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:30: echo '</zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:30"
( $at_check_trace; echo '</zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }




    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:32" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:32"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE="251"
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:32" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:32"



    { set +x
$as_echo "$at_srcdir/gh290.at:33: grep \"ERROR:.*Missing attribute protocol for port\" ./firewalld.log"
at_fn_check_prepare_trace "gh290.at:33"
( $at_check_trace; grep "ERROR:.*Missing attribute protocol for port" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"ignore" != x"ignore"; then
            $as_echo "gh290.at:34" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:34"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_242
#AT_START_243
at_fn_group_banner 243 'icmp_block_in_forward_chain.at:1' \
  "ICMP block not present FORWARD chain" "           " 9
at_xfail=no
(
  $as_echo "243. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/icmp_block_in_forward_chain.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"








    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-icmp-block=host-prohibited "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-icmp-block=host-prohibited
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_block_in_forward_chain.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 code 10 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_public_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_block_in_forward_chain.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_public_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"" != x"ignore"; then
            $as_echo "icmp_block_in_forward_chain.at:26" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:26"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_243
#AT_START_244
at_fn_group_banner 244 'pr323.at:1' \
  "GRE proto helper" "                               " 9
at_xfail=no
(
  $as_echo "244. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/pr323.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/pr323.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/pr323.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/pr323.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "pr323.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/pr323.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "pr323.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr323.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "pr323.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr323.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "pr323.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:1"






    $as_echo "pr323.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} modinfo nf_conntrack_proto_gre ) \
  && at_fn_check_skip 77 "$at_srcdir/pr323.at:4"





    { set +x
$as_echo "$at_srcdir/pr323.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/pr323.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/pr323.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/pr323.at:10: lsmod | grep nf_conntrack_proto_gre"
at_fn_check_prepare_notrace 'a shell pipeline' "pr323.at:10"
( $at_check_trace; lsmod | grep nf_conntrack_proto_gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"" != x"ignore"; then
            $as_echo "pr323.at:12" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_244
#AT_START_245
at_fn_group_banner 245 'rhbz1506742.at:1' \
  "ipset with timeout" "                             " 9
at_xfail=no
(
  $as_echo "245. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"









        $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPSET -h >/dev/null 2>&1  ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --option=maxelem=1000000 --option=family=inet --option=hashsize=4096 --option=timeout=600 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --option=maxelem=1000000 --option=family=inet --option=hashsize=4096 --option=timeout=600
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >foobar_entries.txt <<'_ATEOF'

1.2.3.4
10.0.1.1
_ATEOF




    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d'               -e '/WARNING: NOT_ENABLED/d'" != x"ignore"; then
            $as_echo "rhbz1506742.at:31" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d'               -e '/WARNING: NOT_ENABLED/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:31"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_245
#AT_START_246
at_fn_group_banner 246 'rhbz1594657.at:1' \
  "no log untracked passthrough queries" "           " 9
at_xfail=no
(
  $as_echo "246. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1594657.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"






        $as_echo "rhbz1594657.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1594657.at:3"






    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough eb -t filter -L dummy_chain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough eb -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough eb -t filter -L INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough eb -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -C dummy_chain -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -C dummy_chain -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -L dummy_chain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -L INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }






    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -C dummy_chain -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -C dummy_chain -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -L dummy_chain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -L INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi



        if test x"" != x"ignore"; then
            $as_echo "rhbz1594657.at:17" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_246
#AT_START_247
at_fn_group_banner 247 'rhbz1571957.at:1' \
  "set-log-denied w/ ICMP block inversion" "         " 9
at_xfail=no
(
  $as_echo "247. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1571957.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=public --add-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=public --add-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --set-log-denied=all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --set-log-denied=all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/rhbz1571957.at:7: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:7"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --set-log-denied=broadcast "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --set-log-denied=broadcast
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "rhbz1571957.at:12" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_247
#AT_START_248
at_fn_group_banner 248 'rhbz1404076.at:1' \
  "query single port added with range" "             " 9
at_xfail=no
(
  $as_echo "248. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1404076.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"










    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=8070-8080/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=8070-8080/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9050-10050/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9050-10050/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9000/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9000/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8085-8087/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8085-8087/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8080-8089/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8080-8089/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8081-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8081-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=webcache/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8091/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8085/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10000-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10000-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9999/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9999/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10011/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10011/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9095-10000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9095-10000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9090-9094/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9090-9094/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=9099-10001/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=9099-10001/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10005-10020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10005-10020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10021-10022/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10021-10022/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9080-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9080-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9079-10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9079-10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=9093-10025/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=9093-10025/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70: grep \"WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:70"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=9090-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=9090-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9000/tcp 9010-9020/tcp 9079-10041/tcp 10050-10060/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=9079/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=9079/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=9080-9085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=9080-9085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10035-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10035-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10005-10009/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10005-10009/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10100-10110/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10100-10110/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70: grep \"WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:70"
( $at_check_trace; grep "WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10001-10004/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10001-10004/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10016-10019/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10016-10019/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10003-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10003-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10004-10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10004-10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10009-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10009-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9086-10004/tcp 10010-10034/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=8070-8080/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=8070-8080/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9050-10050/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9050-10050/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9000/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9000/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8085-8087/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8085-8087/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8080-8089/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8080-8089/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8081-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8081-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=webcache/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8091/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8085/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10000-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10000-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9999/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9999/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10011/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10011/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9095-10000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9095-10000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9090-9094/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9090-9094/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=9099-10001/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=9099-10001/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10005-10020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10005-10020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10021-10022/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10021-10022/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9080-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9080-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9079-10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9079-10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=9093-10025/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=9093-10025/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71: grep \"WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:71"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=9090-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=9090-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9000/tcp 9010-9020/tcp 9079-10041/tcp 10050-10060/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=9079/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=9079/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=9080-9085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=9080-9085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10035-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10035-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10005-10009/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10005-10009/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10100-10110/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10100-10110/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71: grep \"WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:71"
( $at_check_trace; grep "WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10001-10004/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10001-10004/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10016-10019/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10016-10019/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10003-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10003-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10004-10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10004-10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10009-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10009-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9086-10004/tcp 10010-10034/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=8070-8080/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=8070-8080/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9050-10050/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9050-10050/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9000/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9000/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8085-8087/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8085-8087/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8080-8089/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8080-8089/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8081-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8081-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=webcache/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8091/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8085/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10000-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10000-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9999/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9999/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10011/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10011/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9095-10000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9095-10000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9090-9094/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9090-9094/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=9099-10001/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=9099-10001/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10005-10020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10005-10020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10021-10022/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10021-10022/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9080-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9080-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9079-10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9079-10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=9093-10025/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=9093-10025/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72: grep \"WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:72"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=9090-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=9090-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9000/tcp 9010-9020/tcp 9079-10041/tcp 10050-10060/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=9079/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=9079/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=9080-9085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=9080-9085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10035-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10035-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10005-10009/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10005-10009/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10100-10110/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10100-10110/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72: grep \"WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:72"
( $at_check_trace; grep "WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10001-10004/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10001-10004/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10016-10019/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10016-10019/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10003-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10003-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10004-10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10004-10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10009-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10009-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9086-10004/tcp 10010-10034/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=8070-8080/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=8070-8080/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9050-10050/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9050-10050/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9000/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9000/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085-8087/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085-8087/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8080-8089/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8080-8089/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8081-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8081-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=webcache/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8091/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10000-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10000-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9999/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9999/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10011/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10011/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9095-10000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9095-10000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9090-9094/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9090-9094/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9099-10001/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9099-10001/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10005-10020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10005-10020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10021-10022/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10021-10022/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9080-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9080-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9079-10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9079-10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9093-10025/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9093-10025/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73: grep \"WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:73"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9090-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9090-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9000/tcp 9010-9020/tcp 9079-10041/tcp 10050-10060/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9079/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9079/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9080-9085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9080-9085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10035-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10035-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10005-10009/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10005-10009/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10100-10110/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10100-10110/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73: grep \"WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:73"
( $at_check_trace; grep "WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10001-10004/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10001-10004/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10016-10019/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10016-10019/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10003-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10003-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10004-10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10004-10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10009-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10009-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9086-10004/tcp 10010-10034/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"-e '/WARNING: ALREADY_ENABLED:/d'              -e '/WARNING: NOT_ENABLED:/d'" != x"ignore"; then
            $as_echo "rhbz1404076.at:76" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/WARNING: ALREADY_ENABLED:/d'              -e '/WARNING: NOT_ENABLED:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:76"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_248
#AT_START_249
at_fn_group_banner 249 'gh366.at:1' \
  "service destination multiple IP versions" "       " 9
at_xfail=no
(
  $as_echo "249. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh366.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh366.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh366.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh366.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh366.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh366.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh366.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh366.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh366.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh366.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh366.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:1"










    { set +x
$as_echo "$at_srcdir/gh366.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-service=mdns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-service=mdns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/gh366.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT 17 -- 0.0.0.0/0 224.0.0.251 udp dpt:5353
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh366.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:22
ACCEPT 17 -- ::/0 fe80::/64 udp dpt:546
ACCEPT 17 -- ::/0 ff02::fb udp dpt:5353
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/gh366.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --remove-service=mdns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --remove-service=mdns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh366.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-rich-rule=\"rule service name=\"mdns\" accept\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-rich-rule="rule service name="mdns" accept"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/gh366.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT 17 -- 0.0.0.0/0 224.0.0.251 udp dpt:5353
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh366.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:22
ACCEPT 17 -- ::/0 fe80::/64 udp dpt:546
ACCEPT 17 -- ::/0 ff02::fb udp dpt:5353
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/gh366.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-rich-rule='rule family=\"ipv4\" destination address=\"10.10.10.0/24\" service name=\"mdns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-rich-rule='rule family="ipv4" destination address="10.10.10.0/24" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 122 $at_status "$at_srcdir/gh366.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"-e '/ERROR: INVALID_RULE: Destination conflict with service/d'" != x"ignore"; then
            $as_echo "gh366.at:36" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_RULE: Destination conflict with service/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:36"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_249
#AT_START_250
at_fn_group_banner 250 'rhbz1601610.at:1' \
  "ipset duplicate entries" "                        " 9
at_xfail=no
(
  $as_echo "250. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"









        $as_echo "rhbz1601610.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPSET -h >/dev/null 2>&1  ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:4"







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --new-ipset=foobar --permanent --type=hash:net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --new-ipset=foobar --permanent --type=hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.2.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.2.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.1.2.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.1.2.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "Warning: ALREADY_ENABLED: '10.1.0.0/22' already is in 'foobar'
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.2.0.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.2.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.1.0.0/22
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }











        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.1.0.0/22
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entry=10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1601610.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.2.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.2.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1601610.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.2.0.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.2.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }











        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset=foobar --add-entry=10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset=foobar --add-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.1.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset=foobar --remove-entry=10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset=foobar --remove-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entry=10.3.0.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entry=10.3.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:69:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:69"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }












        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
10.3.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi





{ set +x
$as_echo "$at_srcdir/rhbz1601610.at:89: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:89"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }












        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
10.3.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi







        if test x"-e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d'              -e '/WARNING: ALREADY_ENABLED:/d'" != x"ignore"; then
            $as_echo "rhbz1601610.at:108" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d'              -e '/WARNING: ALREADY_ENABLED:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:108"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_250
#AT_START_251
at_fn_group_banner 251 'gh303.at:1' \
  "unicode in XML" "                                 " 9
at_xfail=no
(
  $as_echo "251. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh303.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh303.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh303.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh303.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh303.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh303.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh303.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh303.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh303.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:1"





{ set +x
$as_echo "$at_srcdir/gh303.at:4: mkdir -p ./services"
at_fn_check_prepare_trace "gh303.at:4"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh303.at:5: cat <<HERE > ./services/unicode-service-test.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>unicode-service-test</short>
  <description>A string with unicode characters; Ё ώ € ⇶ ▜ ◯ ★ ☠ ☯ ☺ ♻ </description>
  <port protocol=\"tcp\" port=\"12345\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "gh303.at:5"
( $at_check_trace; cat <<HERE > ./services/unicode-service-test.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>unicode-service-test</short>
  <description>A string with unicode characters; Ё ώ € ⇶ ▜ ◯ ★ ☠ ☯ ☺ ♻ </description>
  <port protocol="tcp" port="12345"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }


LC_ALL="C"
export LC_ALL


    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh303.at:17" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:17"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh303.at:17" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:17"






    { set +x
$as_echo "$at_srcdir/gh303.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-service=unicode-service-test "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-service=unicode-service-test
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh303.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh303.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "gh303.at:22" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:22"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_251
#AT_START_252
at_fn_group_banner 252 'gh335.at:1' \
  "forward-port toaddr enables IP forwarding" "      " 9
at_xfail=no
(
  $as_echo "252. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh335.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh335.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh335.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh335.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh335.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh335.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh335.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh335.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh335.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh335.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh335.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:1"






    { set +x
$as_echo "$at_srcdir/gh335.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi




    { set +x
$as_echo "$at_srcdir/gh335.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi




    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321:toaddr=\"1234:5678::4321\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321:toaddr="1234:5678::4321"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }






    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/gh335.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi




    { set +x
$as_echo "$at_srcdir/gh335.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\" to-addr=\"10.10.10.10\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port="12345" protocol="tcp" to-port="54321" to-addr="10.10.10.10"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi




    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\" to-addr=\"1234:5678::4321\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port="12345" protocol="tcp" to-port="54321" to-addr="1234:5678::4321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }






    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/gh335.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/gh335.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port="12345" protocol="tcp" to-port="54321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/gh335.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port="12345" protocol="tcp" to-port="54321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi






        if test x"-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            $as_echo "gh335.at:68" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:68"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_252
#AT_START_253
at_fn_group_banner 253 'gh482.at:1' \
  "remove forward-port after reload" "               " 9
at_xfail=no
(
  $as_echo "253. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh482.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh482.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh482.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh482.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh482.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh482.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh482.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh482.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh482.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh482.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh482.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:1"








    { set +x
$as_echo "$at_srcdir/gh482.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q             --add-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q             --add-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q             --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q             --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q             --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q             --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q             --remove-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q             --remove-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "gh482.at:17" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_253
#AT_START_254
at_fn_group_banner 254 'gh478.at:1' \
  "rich rule marks every packet" "                   " 9
at_xfail=no
(
  $as_echo "254. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh478.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh478.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh478.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh478.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh478.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh478.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh478.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh478.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh478.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh478.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh478.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:1"








    { set +x
$as_echo "$at_srcdir/gh478.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule port port=1234 protocol=tcp mark set=10' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule port port=1234 protocol=tcp mark set=10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh478.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule protocol value=icmp mark set=11' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule protocol value=icmp mark set=11'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh478.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule source-port port=4321 protocol=tcp mark set=12' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule source-port port=4321 protocol=tcp mark set=12'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/gh478.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh478.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1234 MARK set 0xa
MARK 1 -- 0.0.0.0/0 0.0.0.0/0 MARK set 0xb
MARK 6 -- 0.0.0.0/0 0.0.0.0/0 tcp spt:4321 MARK set 0xc
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh478.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh478.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK 6 -- ::/0 ::/0 tcp dpt:1234 MARK set 0xa
MARK 1 -- ::/0 ::/0 MARK set 0xb
MARK 6 -- ::/0 ::/0 tcp spt:4321 MARK set 0xc
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "gh478.at:28" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:28"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_254
#AT_START_255
at_fn_group_banner 255 'gh258.at:1' \
  "zone dispatch layout" "                           " 9
at_xfail=no
(
  $as_echo "255. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh258.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh258.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh258.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh258.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh258.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh258.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh258.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh258.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh258.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh258.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh258.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:1"








    { set +x
$as_echo "$at_srcdir/gh258.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-source=\"1.2.3.0/24\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-source="1.2.3.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/gh258.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=\"dead:beef::/54\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source="dead:beef::/54"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/gh258.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-interface=dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh258.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=dummy1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh258.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh258.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }



















    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :





    else
        :





    fi

























    { set +x
$as_echo "$at_srcdir/gh258.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
DROP 0 -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
INPUT_direct 0 -- 0.0.0.0/0 0.0.0.0/0
INPUT_POLICIES 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 1.2.3.0/24 0.0.0.0/0
IN_trusted 0 -- 1.2.3.0/24 0.0.0.0/0
ACCEPT 0 -- 1.2.3.0/24 0.0.0.0/0
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_trusted 0 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:285"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
DROP 0 -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
FORWARD_direct 0 -- 0.0.0.0/0 0.0.0.0/0
FORWARD_POLICIES 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_trusted 0 -- 1.2.3.0/24 1.2.3.0/24
ACCEPT 0 -- 1.2.3.0/24 1.2.3.0/24
FWD_trusted 0 -- 1.2.3.0/24 0.0.0.0/0
ACCEPT 0 -- 1.2.3.0/24 0.0.0.0/0
FWD_trusted 0 -- 1.2.3.0/24 0.0.0.0/0
ACCEPT 0 -- 1.2.3.0/24 0.0.0.0/0
FWD_trusted 0 -- 1.2.3.0/24 0.0.0.0/0
ACCEPT 0 -- 1.2.3.0/24 0.0.0.0/0
FWD_public 0 -- 0.0.0.0/0 1.2.3.0/24
REJECT 0 -- 0.0.0.0/0 1.2.3.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_trusted 0 -- 0.0.0.0/0 1.2.3.0/24
ACCEPT 0 -- 0.0.0.0/0 1.2.3.0/24
FWD_trusted 0 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_trusted 0 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_trusted 0 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_public 0 -- 0.0.0.0/0 1.2.3.0/24
REJECT 0 -- 0.0.0.0/0 1.2.3.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:341:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:341"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct 0 -- 0.0.0.0/0 0.0.0.0/0
PREROUTING_POLICIES 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:341"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 1.2.3.0/24 0.0.0.0/0
PRE_trusted 0 -- 1.2.3.0/24 0.0.0.0/0
RETURN 0 -- 1.2.3.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_trusted 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:345"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct 0 -- 0.0.0.0/0 0.0.0.0/0
PREROUTING_POLICIES 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 1.2.3.0/24 0.0.0.0/0
PRE_trusted 0 -- 1.2.3.0/24 1.2.3.0/24
RETURN 0 -- 1.2.3.0/24 1.2.3.0/24
PRE_trusted 0 -- 1.2.3.0/24 0.0.0.0/0
RETURN 0 -- 1.2.3.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 1.2.3.0/24
RETURN 0 -- 0.0.0.0/0 1.2.3.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_trusted 0 -- 0.0.0.0/0 1.2.3.0/24
RETURN 0 -- 0.0.0.0/0 1.2.3.0/24
PRE_trusted 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 1.2.3.0/24
RETURN 0 -- 0.0.0.0/0 1.2.3.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:363"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:385:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:385"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct 0 -- 0.0.0.0/0 0.0.0.0/0
PREROUTING_POLICIES 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:385"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:389:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:389"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 1.2.3.0/24 0.0.0.0/0
PRE_trusted 0 -- 1.2.3.0/24 1.2.3.0/24
RETURN 0 -- 1.2.3.0/24 1.2.3.0/24
PRE_trusted 0 -- 1.2.3.0/24 0.0.0.0/0
RETURN 0 -- 1.2.3.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 1.2.3.0/24
RETURN 0 -- 0.0.0.0/0 1.2.3.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_trusted 0 -- 0.0.0.0/0 1.2.3.0/24
RETURN 0 -- 0.0.0.0/0 1.2.3.0/24
PRE_trusted 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 1.2.3.0/24
RETURN 0 -- 0.0.0.0/0 1.2.3.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:389"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:411:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:411"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POSTROUTING_direct 0 -- 0.0.0.0/0 0.0.0.0/0
POSTROUTING_POLICIES 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:411"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:415:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:415"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_trusted 0 -- 1.2.3.0/24 1.2.3.0/24
RETURN 0 -- 1.2.3.0/24 1.2.3.0/24
POST_trusted 0 -- 0.0.0.0/0 1.2.3.0/24
RETURN 0 -- 0.0.0.0/0 1.2.3.0/24
POST_public 0 -- 1.2.3.0/24 0.0.0.0/0
RETURN 0 -- 1.2.3.0/24 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_trusted 0 -- 1.2.3.0/24 0.0.0.0/0
RETURN 0 -- 1.2.3.0/24 0.0.0.0/0
POST_trusted 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 1.2.3.0/24 0.0.0.0/0
RETURN 0 -- 1.2.3.0/24 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:415"
$at_failed && at_fn_log_failure
$at_traceon; }












    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:434:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:434"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT 0 -- ::/0 ::/0
DROP 0 -- ::/0 ::/0 ctstate INVALID
INPUT_direct 0 -- ::/0 ::/0
INPUT_POLICIES 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:434"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:442:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:442"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- dead:beef::/54 ::/0
IN_public 0 -- dead:beef::/54 ::/0
REJECT 0 -- dead:beef::/54 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_trusted 0 -- ::/0 ::/0
ACCEPT 0 -- ::/0 ::/0
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:442"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:456:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:456"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT 0 -- ::/0 ::/0
DROP 0 -- ::/0 ::/0 ctstate INVALID
FORWARD_direct 0 -- ::/0 ::/0
RFC3964_IPv4 0 -- ::/0 ::/0
FORWARD_POLICIES 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:456"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:465:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:465"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_public 0 -- dead:beef::/54 dead:beef::/54
REJECT 0 -- dead:beef::/54 dead:beef::/54 reject-with icmp6-port-unreachable
FWD_public 0 -- dead:beef::/54 ::/0
REJECT 0 -- dead:beef::/54 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- dead:beef::/54 ::/0
REJECT 0 -- dead:beef::/54 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- dead:beef::/54 ::/0
REJECT 0 -- dead:beef::/54 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 dead:beef::/54
REJECT 0 -- ::/0 dead:beef::/54 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_trusted 0 -- ::/0 dead:beef::/54
ACCEPT 0 -- ::/0 dead:beef::/54
FWD_trusted 0 -- ::/0 ::/0
ACCEPT 0 -- ::/0 ::/0
FWD_trusted 0 -- ::/0 ::/0
ACCEPT 0 -- ::/0 ::/0
FWD_trusted 0 -- ::/0 ::/0
ACCEPT 0 -- ::/0 ::/0
FWD_public 0 -- ::/0 dead:beef::/54
REJECT 0 -- ::/0 dead:beef::/54 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:465"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:499:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:499"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct 0 -- ::/0 ::/0
PREROUTING_POLICIES 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:499"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:503:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:503"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- dead:beef::/54 ::/0
PRE_public 0 -- dead:beef::/54 ::/0
RETURN 0 -- dead:beef::/54 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_trusted 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:503"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 58 -- ::/0 ::/0 ipv6-icmptype 134
ACCEPT 58 -- ::/0 ::/0 ipv6-icmptype 135
DROP 0 -- ::/0 ::/0 rpfilter validmark invert
PREROUTING_direct 0 -- ::/0 ::/0
PREROUTING_POLICIES 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:517"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:524:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:524"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- dead:beef::/54 ::/0
PRE_public 0 -- dead:beef::/54 dead:beef::/54
RETURN 0 -- dead:beef::/54 dead:beef::/54
PRE_public 0 -- dead:beef::/54 ::/0
RETURN 0 -- dead:beef::/54 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 dead:beef::/54
RETURN 0 -- ::/0 dead:beef::/54
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_trusted 0 -- ::/0 dead:beef::/54
RETURN 0 -- ::/0 dead:beef::/54
PRE_trusted 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 dead:beef::/54
RETURN 0 -- ::/0 dead:beef::/54
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:524"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:546:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:546"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct 0 -- ::/0 ::/0
PREROUTING_POLICIES 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:546"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:550:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:550"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- dead:beef::/54 ::/0
PRE_public 0 -- dead:beef::/54 dead:beef::/54
RETURN 0 -- dead:beef::/54 dead:beef::/54
PRE_public 0 -- dead:beef::/54 ::/0
RETURN 0 -- dead:beef::/54 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 dead:beef::/54
RETURN 0 -- ::/0 dead:beef::/54
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_trusted 0 -- ::/0 dead:beef::/54
RETURN 0 -- ::/0 dead:beef::/54
PRE_trusted 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 dead:beef::/54
RETURN 0 -- ::/0 dead:beef::/54
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:550"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:572:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:572"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POSTROUTING_direct 0 -- ::/0 ::/0
POSTROUTING_POLICIES 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:572"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:576:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:576"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_public 0 -- dead:beef::/54 dead:beef::/54
RETURN 0 -- dead:beef::/54 dead:beef::/54
POST_public 0 -- ::/0 dead:beef::/54
RETURN 0 -- ::/0 dead:beef::/54
POST_public 0 -- dead:beef::/54 ::/0
RETURN 0 -- dead:beef::/54 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_trusted 0 -- dead:beef::/54 ::/0
RETURN 0 -- dead:beef::/54 ::/0
POST_trusted 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_public 0 -- dead:beef::/54 ::/0
RETURN 0 -- dead:beef::/54 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:576"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "gh258.at:595" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:595"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_255
#AT_START_256
at_fn_group_banner 256 'rhbz1715977.at:1' \
  "rich rule src/dst with service destination" "     " 9
at_xfail=no
(
  $as_echo "256. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1715977.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"ssh\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_internal_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1715977.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_internal_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT 17 -- 0.0.0.0/0 224.0.0.251 udp dpt:5353
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:137
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:138
ACCEPT 6 -- 0.0.0.0/0 192.168.122.235 tcp dpt:22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_internal_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1715977.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_internal_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:22
ACCEPT 17 -- ::/0 ff02::fb udp dpt:5353
ACCEPT 17 -- ::/0 ::/0 udp dpt:137
ACCEPT 17 -- ::/0 ::/0 udp dpt:138
ACCEPT 17 -- ::/0 fe80::/64 udp dpt:546
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.111.222/32\" source address=\"10.10.10.0/24\" service name=\"ssh\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.111.222/32" source address="10.10.10.0/24" service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_internal_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1715977.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_internal_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT 17 -- 0.0.0.0/0 224.0.0.251 udp dpt:5353
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:137
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:138
ACCEPT 6 -- 0.0.0.0/0 192.168.122.235 tcp dpt:22
ACCEPT 6 -- 10.10.10.0/24 192.168.111.222 tcp dpt:22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_internal_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1715977.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_internal_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:22
ACCEPT 17 -- ::/0 ff02::fb udp dpt:5353
ACCEPT 17 -- ::/0 ::/0 udp dpt:137
ACCEPT 17 -- ::/0 ::/0 udp dpt:138
ACCEPT 17 -- ::/0 fe80::/64 udp dpt:546
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 service name=\"ssdp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 service name="ssdp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:85:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_internal_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1715977.at:85"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_internal_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT 17 -- 0.0.0.0/0 224.0.0.251 udp dpt:5353
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:137
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:138
ACCEPT 6 -- 0.0.0.0/0 192.168.122.235 tcp dpt:22
ACCEPT 6 -- 10.10.10.0/24 192.168.111.222 tcp dpt:22
ACCEPT 17 -- 0.0.0.0/0 239.255.255.250 udp dpt:1900
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_internal_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1715977.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_internal_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:22
ACCEPT 17 -- ::/0 ff02::fb udp dpt:5353
ACCEPT 17 -- ::/0 ::/0 udp dpt:137
ACCEPT 17 -- ::/0 ::/0 udp dpt:138
ACCEPT 17 -- ::/0 fe80::/64 udp dpt:546
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"mdns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rhbz1715977.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"mdns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rhbz1715977.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1715977.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"-e '/ERROR: INVALID_RULE: Destination conflict with service/d'" != x"ignore"; then
            $as_echo "rhbz1715977.at:106" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_RULE: Destination conflict with service/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:106"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_256
#AT_START_257
at_fn_group_banner 257 'rhbz1723610.at:1' \
  "direct remove-rules per family" "                 " 9
at_xfail=no
(
  $as_echo "257. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1723610.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1723610.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1723610.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:1"






        $as_echo "rhbz1723610.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1723610.at:3"






    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rules ipv6 filter INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rules ipv6 filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rules ipv4 filter INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rules ipv4 filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --remove-rules ipv4 filter OUTPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --remove-rules ipv4 filter OUTPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1723610.at:32" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:32"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_257
#AT_START_258
at_fn_group_banner 258 'rhbz1734765.at:1' \
  "zone sources ordered by name" "                   " 9
at_xfail=no
(
  $as_echo "258. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1734765.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1734765.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1734765.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_00 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_00
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_05 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_05
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_02 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_02
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_03 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_03
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_01 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_01
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_04 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_04
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_010 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_010
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_011 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_011
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_012 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_012
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset 'ipsetv4' --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset 'ipsetv4' --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset 'ipsetv6' --type hash:ip --family=inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset 'ipsetv6' --type hash:ip --family=inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset ipsetv4 --add-entry '192.0.2.12' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset ipsetv4 --add-entry '192.0.2.12'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset ipsetv6 --add-entry '::2' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset ipsetv6 --add-entry '::2'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_011 --add-source ipset:ipsetv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_011 --add-source ipset:ipsetv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_01 --add-source=\"10.1.1.0/24\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_01 --add-source="10.1.1.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_02 --add-source=\"10.1.0.0/16\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_02 --add-source="10.1.0.0/16"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_04 --add-source=\"10.2.0.0/16\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_04 --add-source="10.2.0.0/16"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_00 --add-source=\"10.1.1.1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_00 --add-source="10.1.1.1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_03 --add-source=\"10.2.2.0/24\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_03 --add-source="10.2.2.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_05 --add-source=\"10.0.0.0/8\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_05 --add-source="10.0.0.0/8"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_01 --add-source=\"1234:5678::1:1:0/112\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_01 --add-source="1234:5678::1:1:0/112"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_02 --add-source=\"1234:5678::1:0:0/96\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_02 --add-source="1234:5678::1:0:0/96"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_04 --add-source=\"1234:5678::2:0:0/96\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_04 --add-source="1234:5678::2:0:0/96"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_03 --add-source=\"1234:5678::2:2:0/112\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_03 --add-source="1234:5678::2:2:0/112"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_05 --add-source=\"1234:5678::0:0:0/80\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_05 --add-source="1234:5678::0:0:0/80"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_00 --add-source=\"1234:5678::1:1:1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_00 --add-source="1234:5678::1:1:1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=trusted --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=trusted --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-source=\"10.10.10.10\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-source="10.10.10.10"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-source=\"20.20.20.20\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-source="20.20.20.20"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-source=\"1234:5678::10:10:10\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-source="1234:5678::10:10:10"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-source=\"1234:5678::20:20:20\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-source="1234:5678::20:20:20"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=foobar_012 --add-source ipset:ipsetv6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=foobar_012 --add-source ipset:ipsetv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:69:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-interface=foobar2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:69"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-interface=foobar2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:794:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:794"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 10.1.1.1 0.0.0.0/0
IN_foobar_00 0 -- 10.1.1.1 0.0.0.0/0
REJECT 0 -- 10.1.1.1 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 10.1.1.0/24 0.0.0.0/0
IN_foobar_01 0 -- 10.1.1.0/24 0.0.0.0/0
REJECT 0 -- 10.1.1.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 10.10.10.10 0.0.0.0/0
IN_foobar_010 0 -- 10.10.10.10 0.0.0.0/0
REJECT 0 -- 10.10.10.10 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0 match-set ipsetv4 src
IN_foobar_011 0 -- 0.0.0.0/0 0.0.0.0/0 match-set ipsetv4 src
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 match-set ipsetv4 src reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 10.1.0.0/16 0.0.0.0/0
IN_foobar_02 0 -- 10.1.0.0/16 0.0.0.0/0
REJECT 0 -- 10.1.0.0/16 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 10.2.2.0/24 0.0.0.0/0
IN_foobar_03 0 -- 10.2.2.0/24 0.0.0.0/0
REJECT 0 -- 10.2.2.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 10.2.0.0/16 0.0.0.0/0
IN_foobar_04 0 -- 10.2.0.0/16 0.0.0.0/0
REJECT 0 -- 10.2.0.0/16 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 10.0.0.0/8 0.0.0.0/0
IN_foobar_05 0 -- 10.0.0.0/8 0.0.0.0/0
REJECT 0 -- 10.0.0.0/8 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 20.20.20.20 0.0.0.0/0
IN_public 0 -- 20.20.20.20 0.0.0.0/0
REJECT 0 -- 20.20.20.20 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_010 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_trusted 0 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:794"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:835:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:835"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 1234:5678::1:1:1 ::/0
IN_foobar_00 0 -- 1234:5678::1:1:1 ::/0
REJECT 0 -- 1234:5678::1:1:1 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- 1234:5678::1:1:0/112 ::/0
IN_foobar_01 0 -- 1234:5678::1:1:0/112 ::/0
REJECT 0 -- 1234:5678::1:1:0/112 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- 1234:5678::10:10:10 ::/0
IN_foobar_010 0 -- 1234:5678::10:10:10 ::/0
REJECT 0 -- 1234:5678::10:10:10 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0 match-set ipsetv6 src
IN_foobar_012 0 -- ::/0 ::/0 match-set ipsetv6 src
REJECT 0 -- ::/0 ::/0 match-set ipsetv6 src reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- 1234:5678::1:0:0/96 ::/0
IN_foobar_02 0 -- 1234:5678::1:0:0/96 ::/0
REJECT 0 -- 1234:5678::1:0:0/96 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- 1234:5678::2:2:0/112 ::/0
IN_foobar_03 0 -- 1234:5678::2:2:0/112 ::/0
REJECT 0 -- 1234:5678::2:2:0/112 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- 1234:5678::2:0:0/96 ::/0
IN_foobar_04 0 -- 1234:5678::2:0:0/96 ::/0
REJECT 0 -- 1234:5678::2:0:0/96 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- 1234:5678::/80 ::/0
IN_foobar_05 0 -- 1234:5678::/80 ::/0
REJECT 0 -- 1234:5678::/80 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- 1234:5678::20:20:20 ::/0
IN_public 0 -- 1234:5678::20:20:20 ::/0
REJECT 0 -- 1234:5678::20:20:20 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_foobar_010 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_trusted 0 -- ::/0 ::/0
ACCEPT 0 -- ::/0 ::/0
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:835"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "rhbz1734765.at:877" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:877"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_258
#AT_START_259
at_fn_group_banner 259 'gh567.at:1' \
  "rich rule source w/ mark action" "                " 9
at_xfail=no
(
  $as_echo "259. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh567.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh567.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh567.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh567.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh567.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh567.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh567.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh567.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh567.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh567.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh567.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh567.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh567.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh567.at:1"








        $as_echo "gh567.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPSET -h >/dev/null 2>&1  ) \
  && at_fn_check_skip 77 "$at_srcdir/gh567.at:3"







    { set +x
$as_echo "$at_srcdir/gh567.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset=Teste --type=hash:net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset=Teste --type=hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh567.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-rich-rule \"rule family=ipv4 source ipset=Teste mark set=2\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-rich-rule "rule family=ipv4 source ipset=Teste mark set=2"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh567.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh567.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "gh567.at:9" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh567.at:9"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_259
#AT_START_260
at_fn_group_banner 260 'rhbz1779835.at:1' \
  "ipv6 address with brackets" "                     " 9
at_xfail=no
(
  $as_echo "260. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1779835.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1779835.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1779835.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1779835.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1779835.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1779835.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:1"








        $as_echo "rhbz1779835.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPSET -h >/dev/null 2>&1  ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:3"








    if $IP6TABLES -L >/dev/null 2>&1; then
        :

    else
        :
        $as_echo "rhbz1779835.at:5" >"$at_check_line_file"
at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:5"
    fi







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --family=inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --family=inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry='[1234::4321]' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry='[1234::4321]'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar2 --type=hash:net --family=inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar2 --type=hash:net --family=inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar2 --add-entry='[1234::]/64' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar2 --add-entry='[1234::]/64'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "rhbz1779835.at:14" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:14"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_260
#AT_START_261
at_fn_group_banner 261 'rhbz1779835.at:16' \
  "ipv6 address with brackets" "                     " 9
at_xfail=no
(
  $as_echo "261. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:16"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1779835.at:16"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1779835.at:16"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:16"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1779835.at:16" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:16"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1779835.at:16" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:16"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1779835.at:16" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:16"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1779835.at:16" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:16"









    if $IP6TABLES -L >/dev/null 2>&1; then
        :

    else
        :
        $as_echo "rhbz1779835.at:19" >"$at_check_line_file"
at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:19"
    fi







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-source='[::1234]' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-source='[::1234]'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-source='[1234::]/64' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-source='[1234::]/64'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-forward-port=port=1234:proto=tcp:toport=4321:toaddr=[::1234] "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-forward-port=port=1234:proto=tcp:toport=4321:toaddr=[::1234]
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[::4321] forward-port port=\"1234\" protocol=tcp to-port=\"4321\" to-addr=\"[::1234]\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[::4321] forward-port port="1234" protocol=tcp to-port="4321" to-addr="[::1234]"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[1234::]/64 forward-port port=\"1234\" protocol=tcp to-port=\"4321\" to-addr=\"[::1234]\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[1234::]/64 forward-port port="1234" protocol=tcp to-port="4321" to-addr="[::1234]"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[::4321] accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[::4321] accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[1234::]/64 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[1234::]/64 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 destination address=[::4321] accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 destination address=[::4321] accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 destination address=[1234::]/64 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 destination address=[1234::]/64 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1779835.at:36" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:36"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_261
#AT_START_262
at_fn_group_banner 262 'gh330.at:1' \
  "ipset cleanup on reload/stop" "                   " 9
at_xfail=no
(
  $as_echo "262. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh330.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh330.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh330.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh330.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh330.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh330.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh330.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh330.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh330.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh330.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh330.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh330.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh330.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh330.at:1"





{ set +x
$as_echo "$at_srcdir/gh330.at:4: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh330.at:4"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh330.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi











    { set +x
$as_echo "$at_srcdir/gh330.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }









        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh330.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi








{ set +x
$as_echo "$at_srcdir/gh330.at:30: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh330.at:30"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh330.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset foobar --add-entry 10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset foobar --add-entry 10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }








        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4
10.10.10.10
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi











    { set +x
$as_echo "$at_srcdir/gh330.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }









        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4
10.10.10.10
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi










    { set +x
$as_echo "$at_srcdir/gh330.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset foobar --add-entry 4.3.2.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset foobar --add-entry 4.3.2.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }









        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4
10.10.10.10
4.3.2.1
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi










    { set +x
$as_echo "$at_srcdir/gh330.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 6.6.6.6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 6.6.6.6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }









        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4
10.10.10.10
4.3.2.1
6.6.6.6
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi










    { set +x
$as_echo "$at_srcdir/gh330.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/gh330.at:120: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh330.at:120"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh330.at:121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:121"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }






    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh330.at:123" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh330.at:123"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh330.at:123" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh330.at:123"





    { set +x
$as_echo "$at_srcdir/gh330.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }





    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }





        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:127"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi








    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh330.at:142" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh330.at:142"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh330.at:142" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh330.at:142"




        if test x"" != x"ignore"; then
            $as_echo "gh330.at:144" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh330.at:144"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_262
#AT_START_263
at_fn_group_banner 263 'gh599.at:1' \
  "writing to log after copytruncate" "              " 9
at_xfail=no
(
  $as_echo "263. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh599.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh599.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh599.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh599.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh599.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh599.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh599.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh599.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh599.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh599.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh599.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh599.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh599.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh599.at:1"





$as_echo "gh599.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which truncate >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh599.at:4"
$as_echo "gh599.at:5" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which wc >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh599.at:5"
$as_echo "gh599.at:6" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which expr >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh599.at:6"


    { set +x
$as_echo "$at_srcdir/gh599.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} truncate -s 0 ./firewalld.log "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} truncate -s 0 ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh599.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=this_does_not_exist "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=this_does_not_exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/gh599.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh599.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} expr \$(cat ./firewalld.log | wc -c) \">\" 0 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh599.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} expr $(cat ./firewalld.log | wc -c) ">" 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }





        if test x"-e '/ERROR: INVALID_SERVICE: this_does_not_exist/d'" != x"ignore"; then
            $as_echo "gh599.at:17" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_SERVICE: this_does_not_exist/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh599.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_263
#AT_START_264
at_fn_group_banner 264 'rhbz1829104.at:1' \
  "direct rule in zone chain" "                      " 9
at_xfail=no
(
  $as_echo "264. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1829104.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1829104.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1829104.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1829104.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1829104.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1829104.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1829104.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1829104.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1829104.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1829104.at:1"






        $as_echo "rhbz1829104.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1829104.at:1"






    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1829104.at:1" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1829104.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_264
#AT_START_265
at_fn_group_banner 265 'rhbz1843398.at:1' \
  "rich rule source mac" "                           " 9
at_xfail=no
(
  $as_echo "265. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1843398.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1843398.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1843398.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1843398.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1843398.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1843398.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1843398.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1843398.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1843398.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1843398.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule source mac=\"11:22:33:44:55:66\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule source mac="11:22:33:44:55:66" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule='rule source mac=\"11:22:33:44:55:66\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule='rule source mac="11:22:33:44:55:66" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "rhbz1843398.at:8" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1843398.at:8"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_265
#AT_START_266
at_fn_group_banner 266 'rhbz1839781.at:1' \
  "service RH-Satellite-6" "                         " 9
at_xfail=no
(
  $as_echo "266. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1839781.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1839781.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1839781.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1839781.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1839781.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1839781.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1839781.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1839781.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1839781.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1839781.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --add-interface dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --add-interface dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --add-service RH-Satellite-6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --add-service RH-Satellite-6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_trusted_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1839781.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_trusted_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:53
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:53
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:67
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:69
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:68
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8140
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:5000
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpts:5646:5647
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:5671
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8000
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8080
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:9090
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_trusted_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1839781.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_trusted_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:53
ACCEPT 17 -- ::/0 ::/0 udp dpt:53
ACCEPT 6 -- ::/0 ::/0 tcp dpt:80
ACCEPT 6 -- ::/0 ::/0 tcp dpt:443
ACCEPT 17 -- ::/0 ::/0 udp dpt:67
ACCEPT 17 -- ::/0 ::/0 udp dpt:69
ACCEPT 17 -- ::/0 ::/0 udp dpt:68
ACCEPT 6 -- ::/0 ::/0 tcp dpt:8140
ACCEPT 6 -- ::/0 ::/0 tcp dpt:5000
ACCEPT 6 -- ::/0 ::/0 tcp dpts:5646:5647
ACCEPT 6 -- ::/0 ::/0 tcp dpt:5671
ACCEPT 6 -- ::/0 ::/0 tcp dpt:8000
ACCEPT 6 -- ::/0 ::/0 tcp dpt:8080
ACCEPT 6 -- ::/0 ::/0 tcp dpt:9090
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --remove-service RH-Satellite-6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --remove-service RH-Satellite-6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --add-service RH-Satellite-6-capsule "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --add-service RH-Satellite-6-capsule
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_trusted_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1839781.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_trusted_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:53
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:53
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:67
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:69
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:68
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8140
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:5000
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpts:5646:5647
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:5671
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8000
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8080
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:9090
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8443
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_trusted_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1839781.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_trusted_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:53
ACCEPT 17 -- ::/0 ::/0 udp dpt:53
ACCEPT 6 -- ::/0 ::/0 tcp dpt:80
ACCEPT 6 -- ::/0 ::/0 tcp dpt:443
ACCEPT 17 -- ::/0 ::/0 udp dpt:67
ACCEPT 17 -- ::/0 ::/0 udp dpt:69
ACCEPT 17 -- ::/0 ::/0 udp dpt:68
ACCEPT 6 -- ::/0 ::/0 tcp dpt:8140
ACCEPT 6 -- ::/0 ::/0 tcp dpt:5000
ACCEPT 6 -- ::/0 ::/0 tcp dpts:5646:5647
ACCEPT 6 -- ::/0 ::/0 tcp dpt:5671
ACCEPT 6 -- ::/0 ::/0 tcp dpt:8000
ACCEPT 6 -- ::/0 ::/0 tcp dpt:8080
ACCEPT 6 -- ::/0 ::/0 tcp dpt:9090
ACCEPT 6 -- ::/0 ::/0 tcp dpt:8443
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "rhbz1839781.at:123" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1839781.at:123"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_266
#AT_START_267
at_fn_group_banner 267 'rhbz1689429.at:1' \
  "rich rule invalid priority" "                     " 9
at_xfail=no
(
  $as_echo "267. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1689429.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1689429.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1689429.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1689429.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1689429.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1689429.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1689429.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1689429.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1689429.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1689429.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=foo accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=foo accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "Error: INVALID_PRIORITY: invalid 'priority' attribute value 'foo'.
" | \
  $at_diff - "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 139 $at_status "$at_srcdir/rhbz1689429.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule priority=foo accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule priority=foo accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "Error: INVALID_PRIORITY: invalid 'priority' attribute value 'foo'.
" | \
  $at_diff - "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 139 $at_status "$at_srcdir/rhbz1689429.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"ignore" != x"ignore"; then
            $as_echo "rhbz1689429.at:12" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1689429.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_267
#AT_START_268
at_fn_group_banner 268 'rhbz1483921.at:1' \
  "direct and zone mutually exclusive" "             " 9
at_xfail=no
(
  $as_echo "268. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1483921.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1483921.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1483921.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1483921.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1483921.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1483921.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1483921.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1483921.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1483921.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1483921.at:1"






        $as_echo "rhbz1483921.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1483921.at:3"






    { set +x
$as_echo "$at_srcdir/rhbz1483921.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --permanent --direct --add-rule ipv4 nat OUTPUT 1 -p tcp --dport 8443 -j DNAT --to-port 9443 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --permanent --direct --add-rule ipv4 nat OUTPUT 1 -p tcp --dport 8443 -j DNAT --to-port 9443
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1483921.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1483921.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --direct --add-rule ipv4 nat OUTPUT 1 -p tcp --dport 8443 -j DNAT --to-port 9443 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --direct --add-rule ipv4 nat OUTPUT 1 -p tcp --dport 8443 -j DNAT --to-port 9443
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1483921.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1483921.at:9" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1483921.at:9"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_268
#AT_START_269
at_fn_group_banner 269 'rhbz1541077.at:1' \
  "hash:mac and family mutually exclusive" "         " 9
at_xfail=no
(
  $as_echo "269. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1541077.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1541077.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1541077.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1541077.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1541077.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1541077.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1541077.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1541077.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1541077.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1541077.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1541077.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset hashmacv6 --type hash:mac --family inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset hashmacv6 --type hash:mac --family inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1541077.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1541077.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --new-ipset hashmacv6 --type hash:mac --family inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --new-ipset hashmacv6 --type hash:mac --family inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1541077.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rhbz1541077.at:7: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --new-ipset hashmacv6 --type hash:mac --family inet6"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --new-ipset hashmacv6 --type hash:mac --family inet6" "rhbz1541077.at:7"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --new-ipset hashmacv6 --type hash:mac --family inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1541077.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





        if test x"" != x"ignore"; then
            $as_echo "rhbz1541077.at:9" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1541077.at:9"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_269
#AT_START_270
at_fn_group_banner 270 'rhbz1855140.at:1' \
  "rich rule icmptypes with one family" "            " 9
at_xfail=no
(
  $as_echo "270. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1855140.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1855140.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1855140.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1855140.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1855140.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1855140.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1855140.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1855140.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1855140.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1855140.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name=\"neighbour-advertisement\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name="neighbour-advertisement" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name=\"timestamp-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name="timestamp-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule 'rule icmp-type name=bad-header mark set=0x86/0x86' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule 'rule icmp-type name=bad-header mark set=0x86/0x86'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1855140.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1855140.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
ACCEPT 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 13
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1855140.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK 58 -- ::/0 ::/0 ipv6-icmptype 4 code 0 MARK or 0x86
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1855140.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:22
ACCEPT 17 -- ::/0 fe80::/64 udp dpt:546
ACCEPT 58 -- ::/0 ::/0 ipv6-icmptype 128
ACCEPT 58 -- ::/0 ::/0 ipv6-icmptype 136
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule 'rule icmp-type name=bogus mark set=0x86/0x86' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule 'rule icmp-type name=bogus mark set=0x86/0x86'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/rhbz1855140.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule 'rule icmp-type name=bogus mark set=0x86/0x86' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule 'rule icmp-type name=bogus mark set=0x86/0x86'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/rhbz1855140.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule 'rule family=ipv6 icmp-type name=timestamp-request drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule 'rule family=ipv6 icmp-type name=timestamp-request drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/rhbz1855140.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule 'rule family=ipv6 icmp-type name=timestamp-request drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule 'rule family=ipv6 icmp-type name=timestamp-request drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/rhbz1855140.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






        if test x"-e '/ERROR: INVALID_ICMPTYPE:/d'" != x"ignore"; then
            $as_echo "rhbz1855140.at:53" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ICMPTYPE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1855140.at:53"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_270
#AT_START_271
at_fn_group_banner 271 'rhbz1871298.at:1' \
  "rich rule parsing bottleneck" "                   " 9
at_xfail=no
(
  $as_echo "271. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1871298.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1871298.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1871298.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1871298.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1871298.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1871298.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1871298.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1871298.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1871298.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1871298.at:1"





$as_echo "rhbz1871298.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which timeout >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1871298.at:4"


    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} mkdir -p ./zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} echo \"<zone>\" >> ./zones/foobar.xml "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} echo "<zone>" >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} echo \"<short>foobar</short>\" >> ./zones/foobar.xml "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} echo "<short>foobar</short>" >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sh -c 'for I in \$(seq 10000); do echo \"<rule family=\\\"ipv4\\\"><port protocol=\\\"tcp\\\" port=\\\"\$I\\\" /><accept/></rule>\" >> ./zones/foobar.xml; done' "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1871298.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c 'for I in $(seq 10000); do echo "<rule family=\"ipv4\"><port protocol=\"tcp\" port=\"$I\" /><accept/></rule>" >> ./zones/foobar.xml; done'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} echo \"</zone>\" >> ./zones/foobar.xml "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} echo "</zone>" >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }



if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
    FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
fi

    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} timeout 120 firewall-offline-cmd --system-config ./ \$FIREWALL_OFFLINE_CMD_ARGS --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} timeout 120 firewall-offline-cmd --system-config ./ $FIREWALL_OFFLINE_CMD_ARGS --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }





        if test x"" != x"ignore"; then
            $as_echo "rhbz1871298.at:18" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1871298.at:18"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_271
#AT_START_272
at_fn_group_banner 272 'rhbz1596304.at:1' \
  "rich rules strip non-printable characters" "      " 9
at_xfail=no
(
  $as_echo "272. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1596304.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1596304.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1596304.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1596304.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1596304.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1596304.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1596304.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1596304.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1596304.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1596304.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-rich-rule 'rule family=\"ipv4\" source address=\"104.243.250.0/22	\" port port=80 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-rich-rule 'rule family="ipv4" source address="104.243.250.0/22	" port port=80 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1596304.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public (default, active)
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv4\" source address=\"104.243.250.0/22\" port port=\"80\" protocol=\"tcp\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "rhbz1596304.at:26" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1596304.at:26"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_272
#AT_START_273
at_fn_group_banner 273 'gh703.at:1' \
  "add source with mac address" "                    " 9
at_xfail=no
(
  $as_echo "273. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh703.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh703.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh703.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh703.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh703.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh703.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh703.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh703.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh703.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh703.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh703.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh703.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh703.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh703.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh703.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh703.at:1"








    { set +x
$as_echo "$at_srcdir/gh703.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --add-source=34:7e:5c:3a:4c:32 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh703.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --add-source=34:7e:5c:3a:4c:32
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"" != x"ignore"; then
            $as_echo "gh703.at:23" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh703.at:23"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_273
#AT_START_274
at_fn_group_banner 274 'ipset_netmask_allowed.at:1' \
  "ipset netmask allowed type hash:ip" "             " 9
at_xfail=no
(
  $as_echo "274. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "ipset_netmask_allowed.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "ipset_netmask_allowed.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "ipset_netmask_allowed.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/ipset_netmask_allowed.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "ipset_netmask_allowed.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ipset_netmask_allowed.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "ipset_netmask_allowed.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ipset_netmask_allowed.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "ipset_netmask_allowed.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/ipset_netmask_allowed.at:1"








    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.4/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.4/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 4.3.2.1/32 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 4.3.2.1/32
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 4.3.2.1/32 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 4.3.2.1/32
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/ipset_netmask_allowed.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/ipset_netmask_allowed.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4/30 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4/30
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/ipset_netmask_allowed.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.4/30 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.4/30
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/ipset_netmask_allowed.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_ENTRY:/d'" != x"ignore"; then
            $as_echo "ipset_netmask_allowed.at:25" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ENTRY:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/ipset_netmask_allowed.at:25"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_274
#AT_START_275
at_fn_group_banner 275 'rhbz1940928.at:1' \
  "direct -s/-d multiple addresses" "                " 9
at_xfail=no
(
  $as_echo "275. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1940928.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1940928.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1940928.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1940928.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1940928.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1940928.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1940928.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1940928.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1940928.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1940928.at:1"






        $as_echo "rhbz1940928.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1940928.at:3"



{ set +x
$as_echo "$at_srcdir/rhbz1940928.at:7: sed -i 's/^IndividualCalls.*/IndividualCalls=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1940928.at:7"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 9 -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 9 -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_direct; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1940928.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_direct; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT 6 -- 0.0.0.0/0 10.0.0.0/8
ACCEPT 6 -- 0.0.0.0/0 172.16.0.0/16
ACCEPT 6 -- 0.0.0.0/0 192.168.0.0/24
ACCEPT 17 -- 0.0.0.0/0 10.0.0.0/8
ACCEPT 17 -- 0.0.0.0/0 172.16.0.0/16
ACCEPT 17 -- 0.0.0.0/0 192.168.0.0/24
DROP 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_direct; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1940928.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_direct; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT 132 -- 0.0.0.0/0 10.0.0.0/8
ACCEPT 132 -- 0.0.0.0/0 172.16.0.0/16
ACCEPT 132 -- 0.0.0.0/0 192.168.0.0/24
ACCEPT 6 -- 0.0.0.0/0 10.0.0.0/8
ACCEPT 6 -- 0.0.0.0/0 172.16.0.0/16
ACCEPT 6 -- 0.0.0.0/0 192.168.0.0/24
ACCEPT 17 -- 0.0.0.0/0 10.0.0.0/8
ACCEPT 17 -- 0.0.0.0/0 172.16.0.0/16
ACCEPT 17 -- 0.0.0.0/0 192.168.0.0/24
DROP 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 9 -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 9 -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_direct; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1940928.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_direct; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1940928.at:52" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1940928.at:52"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_275
#AT_START_276
at_fn_group_banner 276 'rhbz1936896.at:1' \
  "ipset type hash:net,net" "                        " 9
at_xfail=no
(
  $as_echo "276. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1936896.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1936896.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1936896.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1936896.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1936896.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1936896.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1936896.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1936896.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1936896.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1936896.at:1"








        $as_echo "rhbz1936896.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPSET -h >/dev/null 2>&1  ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1936896.at:3"







    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset testset --type hash:net,net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset testset --type hash:net,net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=testset --add-entry=192.168.0.0/24,10.0.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=testset --add-entry=192.168.0.0/24,10.0.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-ipset=testset | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1936896.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-ipset=testset | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "testset
type: hash:net,net
options:
entries: 192.168.0.0/24,10.0.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }









        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list testset; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1936896.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list testset; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: testset
Type: hash:net,net
Members:
192.168.0.0/24,10.0.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi











        if test x"" != x"ignore"; then
            $as_echo "rhbz1936896.at:32" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1936896.at:32"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_276
#AT_START_277
at_fn_group_banner 277 'gh795.at:1' \
  "ipset entry delete w/ timeout=0" "                " 9
at_xfail=no
(
  $as_echo "277. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh795.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh795.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh795.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh795.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh795.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh795.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh795.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh795.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh795.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh795.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh795.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh795.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh795.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh795.at:1"








    { set +x
$as_echo "$at_srcdir/gh795.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type=hash:ip --option=timeout=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type=hash:ip --option=timeout=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh795.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh795.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "Warning: ALREADY_ENABLED: '1.2.3.4' already is in 'foobar'
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --remove-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --remove-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }













        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh795.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh795.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4 timeout 0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi








    { set +x
$as_echo "$at_srcdir/gh795.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --remove-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --remove-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/WARNING: ALREADY_ENABLED:/d'" != x"ignore"; then
            $as_echo "gh795.at:48" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/WARNING: ALREADY_ENABLED:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh795.at:48"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_277
#AT_START_278
at_fn_group_banner 278 'rhbz1914935.at:1' \
  "zone overlapping ports" "                         " 9
at_xfail=no
(
  $as_echo "278. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1914935.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1914935.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1914935.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1914935.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1914935.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1914935.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1914935.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1914935.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1914935.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1914935.at:1"





{ set +x
$as_echo "$at_srcdir/rhbz1914935.at:4: mkdir -p ./zones"
at_fn_check_prepare_trace "rhbz1914935.at:4"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port port="1024-65535" protocol="tcp" />
<port port="1234" protocol="tcp" />
<port port="2000-3000" protocol="tcp" />
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:15: grep \"WARNING: ALREADY_ENABLED: '1234:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:15"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '1234:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:16: grep \"WARNING: ALREADY_ENABLED: '2000-3000:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:16"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '2000-3000:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1024-65535/tcp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="1024-65535" protocol="tcp" />
<source-port port="1234" protocol="tcp" />
<source-port port="2000-3000" protocol="tcp" />
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:30: grep \"WARNING: ALREADY_ENABLED: '1234:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:30"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '1234:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:31: grep \"WARNING: ALREADY_ENABLED: '2000-3000:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:31"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '2000-3000:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1024-65535/tcp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port port="1024-2000" protocol="tcp" />
<port port="1500-2500" protocol="tcp" />
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:45: grep \"WARNING: ALREADY_ENABLED: '1500-2500:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:45"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '1500-2500:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1914935.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1024-2500/tcp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="1024-2000" protocol="tcp" />
<source-port port="1500-2500" protocol="tcp" />
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:59: grep \"WARNING: ALREADY_ENABLED: '1500-2500:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:59"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '1500-2500:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1914935.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1024-2500/tcp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/WARNING: ALREADY_ENABLED:/d'" != x"ignore"; then
            $as_echo "rhbz1914935.at:64" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/WARNING: ALREADY_ENABLED:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1914935.at:64"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_278
#AT_START_279
at_fn_group_banner 279 'gh696.at:1' \
  "icmp-block-inversion no log blocked" "            " 9
at_xfail=no
(
  $as_echo "279. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh696.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh696.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh696.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh696.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh696.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh696.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh696.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh696.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh696.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh696.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh696.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh696.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh696.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh696.at:1"








    { set +x
$as_echo "$at_srcdir/gh696.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --remove-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh696.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh696.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh696.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/gh696.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh696.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh696.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh696.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT 58 -- ::/0 ::/0 ipv6-icmptype 128 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/gh696.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-log-denied all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-log-denied all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/gh696.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh696.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 LOG flags 0 level 4 prefix \"zone_public_HOST_ICMP_BLOCK: \"
REJECT 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh696.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh696.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG 58 -- ::/0 ::/0 ipv6-icmptype 128 LOG flags 0 level 4 prefix \"zone_public_HOST_ICMP_BLOCK: \"
REJECT 58 -- ::/0 ::/0 ipv6-icmptype 128 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/gh696.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh696.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-log-denied off "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-log-denied off
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/gh696.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh696.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh696.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh696.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:22
ACCEPT 17 -- ::/0 fe80::/64 udp dpt:546
ACCEPT 58 -- ::/0 ::/0 ipv6-icmptype 128
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/gh696.at:79:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-log-denied all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh696.at:79"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-log-denied all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/gh696.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh696.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh696.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh696.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:22
ACCEPT 17 -- ::/0 fe80::/64 udp dpt:546
ACCEPT 58 -- ::/0 ::/0 ipv6-icmptype 128
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh696.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"-d '/WARNING: NOT_ENABLED: icmp-block-inversion/d'" != x"ignore"; then
            $as_echo "gh696.at:102" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -d '/WARNING: NOT_ENABLED: icmp-block-inversion/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh696.at:102"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_279
#AT_START_280
at_fn_group_banner 280 'rhbz1917766.at:1' \
  "rich rule source with netmask" "                  " 9
at_xfail=no
(
  $as_echo "280. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1917766.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1917766.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1917766.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1917766.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1917766.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1917766.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1917766.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1917766.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1917766.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1917766.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1917766.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1917766.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1917766.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1917766.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1917766.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1917766.at:1"









    { set +x
$as_echo "$at_srcdir/rhbz1917766.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --zone public --add-rich-rule='rule family=ipv4 source address=\"192.168.1.0/255.255.255.0\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1917766.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --zone public --add-rich-rule='rule family=ipv4 source address="192.168.1.0/255.255.255.0" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1917766.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule family=ipv4 source address=\"192.168.1.0/255.255.255.0\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1917766.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule family=ipv4 source address="192.168.1.0/255.255.255.0" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <short>foobar</short>
  <description>foobar</description>
  <rule family="ipv4">
    <source address="192.168.0.1/255.255.255.240"/>
    <accept/>
  </rule>
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz1917766.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1917766.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1917766.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1917766.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1917766.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1917766.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1917766.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1917766.at:24" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1917766.at:24"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_280
#AT_START_281
at_fn_group_banner 281 'rhbz2014383.at:1' \
  "same source in two zone xml" "                    " 9
at_xfail=no
(
  $as_echo "281. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz2014383.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2014383.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2014383.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz2014383.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz2014383.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2014383.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz2014383.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz2014383.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2014383.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz2014383.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2014383.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2014383.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz2014383.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz2014383.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz2014383.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz2014383.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz2014383.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz2014383.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz2014383.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz2014383.at:1"





{ set +x
$as_echo "$at_srcdir/rhbz2014383.at:4: mkdir -p ./zones"
at_fn_check_prepare_trace "rhbz2014383.at:4"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2014383.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <short>foobar</short>
  <description>foobar</description>
  <service name="ssh"/>
  <source address="10.10.10.10"/>
  <forward/>
</zone>
_ATEOF


cat >./zones/foobar2.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <short>foobar2</short>
  <description>foobar2</description>
  <service name="ssh"/>
  <source address="10.10.10.10"/>
  <forward/>
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz2014383.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2014383.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/rhbz2014383.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }






cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <short>foobar</short>
  <description>foobar</description>
  <service name="ssh"/>
  <interface name="foobar0"/>
  <forward/>
</zone>
_ATEOF


cat >./zones/foobar2.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <short>foobar2</short>
  <description>foobar2</description>
  <service name="ssh"/>
  <interface name="foobar0"/>
  <forward/>
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz2014383.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2014383.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 104 $at_status "$at_srcdir/rhbz2014383.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"ignore" != x"ignore"; then
            $as_echo "rhbz2014383.at:56" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz2014383.at:56"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_281
#AT_START_282
at_fn_group_banner 282 'gh874.at:1' \
  "policy masquerade w/ ingress interface" "         " 9
at_xfail=no
(
  $as_echo "282. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh874.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh874.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh874.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh874.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh874.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh874.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh874.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh874.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh874.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh874.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh874.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh874.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh874.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh874.at:1"








    { set +x
$as_echo "$at_srcdir/gh874.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone foobar_zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone foobar_zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh874.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy foobar_policy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy foobar_policy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh874.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar_policy --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar_policy --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh874.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar_policy --add-ingress-zone foobar_zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar_policy --add-ingress-zone foobar_zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh874.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar_policy --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar_policy --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh874.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh874.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh874.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar_zone --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar_zone --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/gh874.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh874.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sed -i '2a \\
<interface name=\"foobar\" />
' ./zones/foobar_zone.xml
 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sed -i '2a \
<interface name="foobar" />
' ./zones/foobar_zone.xml

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh874.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh874.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh874.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/gh874.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"ignore" != x"ignore"; then
            $as_echo "gh874.at:33" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh874.at:33"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_282
#AT_START_283
at_fn_group_banner 283 'gh881.at:1' \
  "ipset entry overlap detect perf" "                " 9
at_xfail=no
(
  $as_echo "283. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh881.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh881.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh881.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh881.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh881.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh881.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh881.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh881.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh881.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh881.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh881.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh881.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh881.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh881.at:1"





: >./deny_cidr

    { set +x
$as_echo "$at_srcdir/gh881.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sh -c '
for I in \$(seq 250); do
  for J in \$(seq 250); do
    echo \"10.\${I}.\${J}.0/24\" >> ./deny_cidr
  done
done
' "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh881.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c '
for I in $(seq 250); do
  for J in $(seq 250); do
    echo "10.${I}.${J}.0/24" >> ./deny_cidr
  done
done
'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh881.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} echo \"10.254.0.0/16\" >> ./deny_cidr "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} echo "10.254.0.0/16" >> ./deny_cidr
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh881.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=deny_set --type=hash:net --option=family=inet --option=hashsize=16384 --option=maxelem=20000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=deny_set --type=hash:net --option=family=inet --option=hashsize=16384 --option=maxelem=20000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh881.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }



cat >./deny_cidr <<'_ATEOF'

9.0.0.0/8
11.1.0.0/16
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh881.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }



cat >./deny_cidr <<'_ATEOF'

10.1.0.0/16
10.2.0.0/16
10.250.0.0/16
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh881.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/gh881.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }



cat >./deny_cidr <<'_ATEOF'

10.253.0.0/16
10.253.128.0/17
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh881.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/gh881.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }



cat >./deny_cidr <<'_ATEOF'

10.1.1.1/32
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh881.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/gh881.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }



cat >./deny_cidr <<'_ATEOF'

10.0.0.0/8
10.0.0.0/25
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh881.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} time firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/gh881.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }



: >./deny_cidr



    { set +x
$as_echo "$at_srcdir/gh881.at:57:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh881.at:57"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=deny_set --add-entries-from-file=./deny_cidr
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh881.at:57"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "gh881.at:59" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh881.at:59"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_283
#AT_START_284
at_fn_group_banner 284 'service_includes_for_builtin.at:1' \
  "service include for built-in" "                   " 9
at_xfail=no
(
  $as_echo "284. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_includes_for_builtin.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "service_includes_for_builtin.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "service_includes_for_builtin.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_includes_for_builtin.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "service_includes_for_builtin.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_includes_for_builtin.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "service_includes_for_builtin.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_includes_for_builtin.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "service_includes_for_builtin.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_includes_for_builtin.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "service_includes_for_builtin.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/service_includes_for_builtin.at:1"






    $as_echo "service_includes_for_builtin.at:6" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_includes_for_builtin.at:6"

    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getServiceByName \"ssh\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_includes_for_builtin.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getServiceByName "ssh"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ


    $as_echo "service_includes_for_builtin.at:13" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_includes_for_builtin.at:13"

    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_includes_for_builtin.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(@as [],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service_includes_for_builtin.at:16" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_includes_for_builtin.at:16"

    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.setIncludes '[\"https\", \"http\"]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_includes_for_builtin.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.setIncludes '["https", "http"]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service_includes_for_builtin.at:17" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_includes_for_builtin.at:17"

    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_includes_for_builtin.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['https', 'http'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service_includes_for_builtin.at:20" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_includes_for_builtin.at:20"

    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.addInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_includes_for_builtin.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.addInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service_includes_for_builtin.at:21" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_includes_for_builtin.at:21"

    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_includes_for_builtin.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service_includes_for_builtin.at:24" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_includes_for_builtin.at:24"

    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.removeInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_includes_for_builtin.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.removeInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service_includes_for_builtin.at:25" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_includes_for_builtin.at:25"

    { set +x
$as_echo "$at_srcdir/service_includes_for_builtin.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_includes_for_builtin.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_includes_for_builtin.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "service_includes_for_builtin.at:29" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/service_includes_for_builtin.at:29"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_284
#AT_START_285
at_fn_group_banner 285 'gh940.at:1' \
  "log prefix" "                                     " 9
at_xfail=no
(
  $as_echo "285. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh940.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh940.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh940.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh940.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh940.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh940.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh940.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh940.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh940.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh940.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh940.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh940.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh940.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh940.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh940.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh940.at:1"





{ set +x
$as_echo "$at_srcdir/gh940.at:4: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh940.at:4"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh940.at:5: sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf"
at_fn_check_prepare_trace "gh940.at:5"
( $at_check_trace; sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh940.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh940.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/gh940.at:9: mkdir -p ./policies"
at_fn_check_prepare_trace "gh940.at:9"
( $at_check_trace; mkdir -p ./policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

cat >./policies/log-denied.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<policy target="DROP" priority="1">
<short>log-denied</short>
<description>log denied policy</description>
<ingress-zone name="ANY" />
<egress-zone name="HOST" />
<icmp-block name="echo-request" />
<rule>
    <port port="6667" protocol="tcp" />
    <log prefix="Dropped IRC Packet: " level="warning" />
    <drop />
</rule>
</policy>
_ATEOF




    { set +x
$as_echo "$at_srcdir/gh940.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh940.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh940.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh940.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh940.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh940.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }



















    { set +x
$as_echo "$at_srcdir/gh940.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_log-denied; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh940.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_log-denied; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_log-denied_pre 0 -- 0.0.0.0/0 0.0.0.0/0
IN_log-denied_log 0 -- 0.0.0.0/0 0.0.0.0/0
IN_log-denied_deny 0 -- 0.0.0.0/0 0.0.0.0/0
IN_log-denied_allow 0 -- 0.0.0.0/0 0.0.0.0/0
IN_log-denied_post 0 -- 0.0.0.0/0 0.0.0.0/0
LOG 0 -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix \"IN_log-denied_DROP: \"
DROP 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh940.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_log-denied; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh940.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_log-denied; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_log-denied_pre 0 -- ::/0 ::/0
IN_log-denied_log 0 -- ::/0 ::/0
IN_log-denied_deny 0 -- ::/0 ::/0
IN_log-denied_allow 0 -- ::/0 ::/0
IN_log-denied_post 0 -- ::/0 ::/0
LOG 0 -- ::/0 ::/0 LOG flags 0 level 4 prefix \"IN_log-denied_DROP: \"
DROP 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi















    { set +x
$as_echo "$at_srcdir/gh940.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_log-denied_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh940.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_log-denied_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 LOG flags 0 level 4 prefix \"log-denied_ICMP_BLOCK: \"
REJECT 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 reject-with icmp-host-prohibited
DROP 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:6667
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh940.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_log-denied_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh940.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_log-denied_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG 58 -- ::/0 ::/0 ipv6-icmptype 128 LOG flags 0 level 4 prefix \"log-denied_ICMP_BLOCK: \"
REJECT 58 -- ::/0 ::/0 ipv6-icmptype 128 reject-with icmp6-adm-prohibited
DROP 6 -- ::/0 ::/0 tcp dpt:6667
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi















    { set +x
$as_echo "$at_srcdir/gh940.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_log-denied_log; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh940.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_log-denied_log; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:6667 LOG flags 0 level 4 prefix \"Dropped IRC Packet: \"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh940.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_log-denied_log; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh940.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_log-denied_log; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG 6 -- ::/0 ::/0 tcp dpt:6667 LOG flags 0 level 4 prefix \"Dropped IRC Packet: \"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh940.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "gh940.at:116" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh940.at:116"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_285
#AT_START_286
at_fn_group_banner 286 'build_policy_split_wildcard.at:1' \
  "build policy split wildcards" "                   " 9
at_xfail=no
(
  $as_echo "286. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "build_policy_split_wildcard.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "build_policy_split_wildcard.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "build_policy_split_wildcard.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/build_policy_split_wildcard.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "build_policy_split_wildcard.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/build_policy_split_wildcard.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "build_policy_split_wildcard.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/build_policy_split_wildcard.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "build_policy_split_wildcard.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/build_policy_split_wildcard.at:1"








    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-interface foobar2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-interface foobar2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-interface foobar3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-interface foobar3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-interface tun+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-interface tun+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --remove-interface tun+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --remove-interface tun+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-interface tun+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-interface tun+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/build_policy_split_wildcard.at:201:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-interface net+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "build_policy_split_wildcard.at:201"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-interface net+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/build_policy_split_wildcard.at:201"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            $as_echo "build_policy_split_wildcard.at:319" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/build_policy_split_wildcard.at:319"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_286
#AT_START_287
at_fn_group_banner 287 'gh1011.at:1' \
  "remove entries results in empty" "                " 9
at_xfail=no
(
  $as_echo "287. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh1011.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh1011.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh1011.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh1011.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh1011.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh1011.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh1011.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh1011.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh1011.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh1011.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh1011.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh1011.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh1011.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh1011.at:1"








    { set +x
$as_echo "$at_srcdir/gh1011.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




cat >./empty <<'_ATEOF'
10.10.10.0/24
_ATEOF




    { set +x
$as_echo "$at_srcdir/gh1011.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1011.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entries-from-file ./empty "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entries-from-file ./empty
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh1011.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1011.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh1011.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --add-entry 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --add-entry 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1011.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --remove-entries-from-file ./empty "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1011.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --remove-entries-from-file ./empty
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1011.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "gh1011.at:15" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh1011.at:15"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_287
#AT_START_288
at_fn_group_banner 288 'rhbz2181406.at:1' \
  "rich rule limit" "                                " 9
at_xfail=no
(
  $as_echo "288. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz2181406.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2181406.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz2181406.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz2181406.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz2181406.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz2181406.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz2181406.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2181406.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz2181406.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz2181406.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz2181406.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz2181406.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz2181406.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz2181406.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz2181406.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz2181406.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz2181406.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=ipv4 source address=10.10.10.10 service name=ssh log limit value=\"2/d\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2181406.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family=ipv4 source address=10.10.10.10 service name=ssh log limit value="2/d"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2181406.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=ipv6 destination address=fc00::10:10:10:10 service name=ssh audit limit value=\"5/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2181406.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family=ipv6 destination address=fc00::10:10:10:10 service name=ssh audit limit value="5/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz2181406.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=ipv4 source address=10.10.10.10 service name=http accept limit value=\"2/d\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2181406.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family=ipv4 source address=10.10.10.10 service name=http accept limit value="2/d"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2181406.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=ipv6 destination address=fc00::10:10:10:10 service name=http accept limit value=\"5/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2181406.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family=ipv6 destination address=fc00::10:10:10:10 service name=http accept limit value="5/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/rhbz2181406.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_log; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz2181406.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_log; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG 6 -- 10.10.10.10 0.0.0.0/0 tcp dpt:22 limit: avg 2/day burst 5 LOG flags 0 level 4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz2181406.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz2181406.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT 6 -- 10.10.10.10 0.0.0.0/0 tcp dpt:80 limit: avg 2/day burst 5
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }












    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz2181406.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_log; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz2181406.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_log; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "AUDIT 6 -- ::/0 fc00::10:10:10:10 tcp dpt:22 limit: avg 5/min burst 5 AUDIT accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz2181406.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz2181406.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:22
ACCEPT 17 -- ::/0 fe80::/64 udp dpt:546
ACCEPT 6 -- ::/0 fc00::10:10:10:10 tcp dpt:22
ACCEPT 6 -- ::/0 fc00::10:10:10:10 tcp dpt:80 limit: avg 5/min burst 5
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2181406.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "rhbz2181406.at:49" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz2181406.at:49"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_288
#AT_START_289
at_fn_group_banner 289 'ipset_scale.at:1' \
  "ipset scale" "                                    " 9
at_xfail=no
(
  $as_echo "289. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/ipset_scale.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_scale.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/ipset_scale.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "ipset_scale.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/ipset_scale.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "ipset_scale.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/ipset_scale.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_scale.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "ipset_scale.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/ipset_scale.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "ipset_scale.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ipset_scale.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "ipset_scale.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ipset_scale.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "ipset_scale.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/ipset_scale.at:1"





{ set +x
$as_echo "$at_srcdir/ipset_scale.at:5: touch ./entries"
at_fn_check_prepare_trace "ipset_scale.at:5"
( $at_check_trace; touch ./entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/ipset_scale.at:6: sh -c '
for I in \$(seq 250); do
    for J in \$(seq 250); do
        echo \"10.10.\${I}.\${J}/32\" >> ./entries
    done
done
'"
at_fn_check_prepare_notrace 'a $(...) command substitution' "ipset_scale.at:6"
( $at_check_trace; sh -c '
for I in $(seq 250); do
    for J in $(seq 250); do
        echo "10.10.${I}.${J}/32" >> ./entries
    done
done
'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/ipset_scale.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_scale.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_scale.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entries-from-file ./entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_scale.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entries-from-file ./entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }





ulimit -d $(expr 1024 \* 300)



    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "ipset_scale.at:22" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ipset_scale.at:22"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "ipset_scale.at:22" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/ipset_scale.at:22"





    { set +x
$as_echo "$at_srcdir/ipset_scale.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_scale.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_scale.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_scale.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_scale.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "ipset_scale.at:25" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/ipset_scale.at:25"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_289
#AT_START_290
at_fn_group_banner 290 'gh1129.at:16' \
  "switch backend to nftables and reload" "          " 9
at_xfail=no
(
  $as_echo "290. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh1129.at:16: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1129.at:16"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1129.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh1129.at:16: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh1129.at:16"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1129.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh1129.at:16: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh1129.at:16"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1129.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh1129.at:16: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1129.at:16"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1129.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh1129.at:16" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh1129.at:16"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh1129.at:16" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh1129.at:16"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh1129.at:16" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh1129.at:16"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh1129.at:16" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh1129.at:16"




$as_echo "gh1129.at:16" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} command -v iptables-save >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh1129.at:16"

{ set +x
$as_echo "$at_srcdir/gh1129.at:16: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh1129.at:16"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1129.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh1129.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1129.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1129.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1129.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1129.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1129.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1129.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} iptables-save |grep DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1129.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} iptables-save |grep DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh1129.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }





        if test x"" != x"ignore"; then
            $as_echo "gh1129.at:16" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh1129.at:16"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_290
#AT_START_291
at_fn_group_banner 291 'gh1146.at:1' \
  "policy with mixed family zone source" "           " 9
at_xfail=no
(
  $as_echo "291. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh1146.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh1146.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh1146.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh1146.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh1146.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh1146.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh1146.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh1146.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh1146.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh1146.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh1146.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh1146.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh1146.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh1146.at:1"








    { set +x
$as_echo "$at_srcdir/gh1146.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface dummy1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1146.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-source 10.11.11.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-source 10.11.11.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/gh1146.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-source fc00:1111:1111:1111::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-source fc00:1111:1111:1111::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/gh1146.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-interface dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-interface dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1146.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-source 10.22.22.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-source 10.22.22.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/gh1146.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-source fc00:2222:2222:2222::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-source fc00:2222:2222:2222::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi







    { set +x
$as_echo "$at_srcdir/gh1146.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1146.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1146.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh1146.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1146.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1146.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/gh1146.at:125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh1146.at:125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 10.11.11.0/24 10.11.11.0/24
REJECT 0 -- 10.11.11.0/24 10.11.11.0/24 reject-with icmp-port-unreachable
FWD_foobar 0 -- 10.11.11.0/24 10.22.22.0/24
FWD_internal 0 -- 10.11.11.0/24 10.22.22.0/24
REJECT 0 -- 10.11.11.0/24 10.22.22.0/24 reject-with icmp-port-unreachable
FWD_internal 0 -- 10.11.11.0/24 0.0.0.0/0
REJECT 0 -- 10.11.11.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 10.11.11.0/24 0.0.0.0/0
FWD_internal 0 -- 10.11.11.0/24 0.0.0.0/0
REJECT 0 -- 10.11.11.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 10.11.11.0/24 0.0.0.0/0
FWD_internal 0 -- 10.11.11.0/24 0.0.0.0/0
REJECT 0 -- 10.11.11.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 10.22.22.0/24 10.11.11.0/24
REJECT 0 -- 10.22.22.0/24 10.11.11.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 10.22.22.0/24 10.22.22.0/24
REJECT 0 -- 10.22.22.0/24 10.22.22.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 10.22.22.0/24 0.0.0.0/0
REJECT 0 -- 10.22.22.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 10.22.22.0/24 0.0.0.0/0
REJECT 0 -- 10.22.22.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 10.22.22.0/24 0.0.0.0/0
REJECT 0 -- 10.22.22.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_internal 0 -- 0.0.0.0/0 10.11.11.0/24
REJECT 0 -- 0.0.0.0/0 10.11.11.0/24 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 10.22.22.0/24
FWD_internal 0 -- 0.0.0.0/0 10.22.22.0/24
REJECT 0 -- 0.0.0.0/0 10.22.22.0/24 reject-with icmp-port-unreachable
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 10.11.11.0/24
REJECT 0 -- 0.0.0.0/0 10.11.11.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 10.22.22.0/24
REJECT 0 -- 0.0.0.0/0 10.22.22.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 10.11.11.0/24
REJECT 0 -- 0.0.0.0/0 10.11.11.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 10.22.22.0/24
REJECT 0 -- 0.0.0.0/0 10.22.22.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh1146.at:183:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh1146.at:183"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- fc00:1111:1111:1111::/64 fc00:1111:1111:1111::/64
REJECT 0 -- fc00:1111:1111:1111::/64 fc00:1111:1111:1111::/64 reject-with icmp6-port-unreachable
FWD_foobar 0 -- fc00:1111:1111:1111::/64 fc00:2222:2222:2222::/64
FWD_internal 0 -- fc00:1111:1111:1111::/64 fc00:2222:2222:2222::/64
REJECT 0 -- fc00:1111:1111:1111::/64 fc00:2222:2222:2222::/64 reject-with icmp6-port-unreachable
FWD_internal 0 -- fc00:1111:1111:1111::/64 ::/0
REJECT 0 -- fc00:1111:1111:1111::/64 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- fc00:1111:1111:1111::/64 ::/0
FWD_internal 0 -- fc00:1111:1111:1111::/64 ::/0
REJECT 0 -- fc00:1111:1111:1111::/64 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- fc00:1111:1111:1111::/64 ::/0
FWD_internal 0 -- fc00:1111:1111:1111::/64 ::/0
REJECT 0 -- fc00:1111:1111:1111::/64 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- fc00:2222:2222:2222::/64 fc00:1111:1111:1111::/64
REJECT 0 -- fc00:2222:2222:2222::/64 fc00:1111:1111:1111::/64 reject-with icmp6-port-unreachable
FWD_public 0 -- fc00:2222:2222:2222::/64 fc00:2222:2222:2222::/64
REJECT 0 -- fc00:2222:2222:2222::/64 fc00:2222:2222:2222::/64 reject-with icmp6-port-unreachable
FWD_public 0 -- fc00:2222:2222:2222::/64 ::/0
REJECT 0 -- fc00:2222:2222:2222::/64 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- fc00:2222:2222:2222::/64 ::/0
REJECT 0 -- fc00:2222:2222:2222::/64 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- fc00:2222:2222:2222::/64 ::/0
REJECT 0 -- fc00:2222:2222:2222::/64 ::/0 reject-with icmp6-port-unreachable
FWD_internal 0 -- ::/0 fc00:1111:1111:1111::/64
REJECT 0 -- ::/0 fc00:1111:1111:1111::/64 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 fc00:2222:2222:2222::/64
FWD_internal 0 -- ::/0 fc00:2222:2222:2222::/64
REJECT 0 -- ::/0 fc00:2222:2222:2222::/64 reject-with icmp6-port-unreachable
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 fc00:1111:1111:1111::/64
REJECT 0 -- ::/0 fc00:1111:1111:1111::/64 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 fc00:2222:2222:2222::/64
REJECT 0 -- ::/0 fc00:2222:2222:2222::/64 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 fc00:1111:1111:1111::/64
REJECT 0 -- ::/0 fc00:1111:1111:1111::/64 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 fc00:2222:2222:2222::/64
REJECT 0 -- ::/0 fc00:2222:2222:2222::/64 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1146.at:183"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "gh1146.at:242" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh1146.at:242"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_291
#AT_START_292
at_fn_group_banner 292 'gh1152.at:1' \
  "list-all identical content" "                     " 9
at_xfail=no
(
  $as_echo "292. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh1152.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh1152.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh1152.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh1152.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh1152.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh1152.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh1152.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh1152.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh1152.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh1152.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh1152.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh1152.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh1152.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh1152.at:1"








    { set +x
$as_echo "$at_srcdir/gh1152.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone block --add-interface dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone block --add-interface dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh1152.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-all-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh1152.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-all-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "block
target: %%REJECT%%
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces: dummy0
sources:
services:
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
dmz
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
drop
target: DROP
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services:
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
external
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
forward: yes
masquerade: yes
forward-ports:
source-ports:
icmp-blocks:
rich rules:
home
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client mdns samba-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
internal
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client mdns samba-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
public (default)
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
trusted
target: ACCEPT
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services:
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
work
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }





    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/gh1152.at:152: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --list-all-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }"
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh1152.at:152"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --list-all-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "block
target: %%REJECT%%
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces: dummy0
sources:
services:
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
dmz
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
drop
target: DROP
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services:
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
external
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
forward: yes
masquerade: yes
forward-ports:
source-ports:
icmp-blocks:
rich rules:
home
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client mdns samba-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
internal
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client mdns samba-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
public (default)
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
trusted
target: ACCEPT
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services:
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
work
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:152"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh1152.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1152.at:300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-service http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1152.at:301:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-all-policies | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh1152.at:301"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-all-policies | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
foobar
priority: -1
target: CONTINUE
ingress-zones:
egress-zones:
services: http
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:301"
$at_failed && at_fn_log_failure
$at_traceon; }





    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/gh1152.at:333: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --list-all-policies | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }"
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh1152.at:333"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --list-all-policies | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
foobar
priority: -1
target: CONTINUE
ingress-zones:
egress-zones:
services: http
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:333"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1152.at:366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1152.at:366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:366"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh1152.at:367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh1152.at:367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "block (active)
target: %%REJECT%%
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces: dummy0
sources:
services:
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
dmz
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
drop
target: DROP
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services:
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
external
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
forward: yes
masquerade: yes
forward-ports:
source-ports:
icmp-blocks:
rich rules:
home
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client mdns samba-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
internal
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client mdns samba-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
public (default, active)
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
trusted
target: ACCEPT
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services:
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
work
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh1152.at:513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all-policies | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh1152.at:513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all-policies | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
foobar
priority: -1
target: CONTINUE
ingress-zones:
egress-zones:
services: http
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:513"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh1152.at:546:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:546"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "block
  interfaces: dummy0
public (default)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:546"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh1152.at:552:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh1152.at:552"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh1152.at:552"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "gh1152.at:558" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh1152.at:558"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_292
#AT_START_293
at_fn_group_banner 293 'rhbz2222044.at:1' \
  "duplicate rules after restart" "                  " 9
at_xfail=no
(
  $as_echo "293. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz2222044.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz2222044.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz2222044.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz2222044.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz2222044.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz2222044.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz2222044.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz2222044.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz2222044.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz2222044.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz2222044.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz2222044.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz2222044.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz2222044.at:1"




$as_echo "rhbz2222044.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} command -v wc >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz2222044.at:3"




{ set +x
$as_echo "$at_srcdir/rhbz2222044.at:20: sed -i 's/^CleanupOnExit.*/CleanupOnExit=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz2222044.at:20"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} iptables-save | wc -l "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} iptables-save | wc -l
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "249
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }





    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz2222044.at:24" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz2222044.at:24"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz2222044.at:24" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz2222044.at:24"




    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} iptables-save | wc -l "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} iptables-save | wc -l
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "249
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} iptables-save | wc -l "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} iptables-save | wc -l
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "249
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} iptables-save | wc -l "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} iptables-save | wc -l
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "249
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/rhbz2222044.at:32: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz2222044.at:32"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} iptables-save | wc -l "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} iptables-save | wc -l
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "249
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }





    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz2222044.at:36" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz2222044.at:36"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz2222044.at:36" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz2222044.at:36"




    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} iptables-save | wc -l "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} iptables-save | wc -l
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "249
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} iptables-save | wc -l "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} iptables-save | wc -l
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "249
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz2222044.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} iptables-save | wc -l "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz2222044.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} iptables-save | wc -l
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "249
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz2222044.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz2222044.at:44" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz2222044.at:44"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_293
#AT_START_294
at_fn_group_banner 294 'python.at:3' \
  "firewalld_test.py" "                              " 10
at_xfail=no
(
  $as_echo "294. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:3: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:3"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:3: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/python.at:3: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/python.at:3: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:3"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "python.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/python.at:3"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "python.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:3"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:3"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:3" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:3"





    { set +x
$as_echo "$at_srcdir/python.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$PYTHON \$(dirname \${at_myself})/python/firewalld_test.py "
at_fn_check_prepare_notrace 'a $(...) command substitution' "python.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $PYTHON $(dirname ${at_myself})/python/firewalld_test.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"ignore" != x"ignore"; then
            $as_echo "python.at:6" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/python.at:6"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_294
#AT_START_295
at_fn_group_banner 295 'python.at:8' \
  "firewalld_config.py" "                            " 10
at_xfail=no
(
  $as_echo "295. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:8: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:8"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:8: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/python.at:8: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/python.at:8: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:8"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "python.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/python.at:8"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "python.at:8" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:8"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:8" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:8"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:8" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:8"





    { set +x
$as_echo "$at_srcdir/python.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$PYTHON \$(dirname \${at_myself})/python/firewalld_config.py "
at_fn_check_prepare_notrace 'a $(...) command substitution' "python.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $PYTHON $(dirname ${at_myself})/python/firewalld_config.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"ignore" != x"ignore"; then
            $as_echo "python.at:11" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/python.at:11"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_295
#AT_START_296
at_fn_group_banner 296 'python.at:13' \
  "firewalld_rich.py" "                              " 10
at_xfail=no
(
  $as_echo "296. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:13: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:13"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:13: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/python.at:13: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/python.at:13: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:13"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "python.at:13" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/python.at:13"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "python.at:13" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:13"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:13" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:13"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:13" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:13"





    { set +x
$as_echo "$at_srcdir/python.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$PYTHON \$(dirname \${at_myself})/python/firewalld_rich.py "
at_fn_check_prepare_notrace 'a $(...) command substitution' "python.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $PYTHON $(dirname ${at_myself})/python/firewalld_rich.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"ignore" != x"ignore"; then
            $as_echo "python.at:16" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/python.at:16"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_296
#AT_START_297
at_fn_group_banner 297 'python.at:18' \
  "firewalld_direct.py" "                            " 10
at_xfail=no
(
  $as_echo "297. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:18: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:18"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:18: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/python.at:18: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/python.at:18: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:18"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "python.at:18" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/python.at:18"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "python.at:18" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:18"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:18" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:18"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:18" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:18"






        $as_echo "python.at:20" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/python.at:20"



    { set +x
$as_echo "$at_srcdir/python.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$PYTHON \$(dirname \${at_myself})/python/firewalld_direct.py "
at_fn_check_prepare_notrace 'a $(...) command substitution' "python.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $PYTHON $(dirname ${at_myself})/python/firewalld_direct.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"ignore" != x"ignore"; then
            $as_echo "python.at:22" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/python.at:22"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_297
#AT_START_298
at_fn_group_banner 298 'rfc3964_ipv4.at:1' \
  "RFC3964_IPv4" "                                   " 11
at_xfail=no
(
  $as_echo "298. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rfc3964_ipv4.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"





{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:4: sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:4"
( $at_check_trace; sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:5: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:5"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

















    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L RFC3964_IPv4; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L RFC3964_IPv4; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG 0 -- ::/0 2002:e000::/19 LOG flags 0 level 4 prefix \"RFC3964_IPv4_REJECT: \"
REJECT 0 -- ::/0 2002:e000::/19 reject-with icmp6-addr-unreachable
LOG 0 -- ::/0 2002:a9fe::/32 LOG flags 0 level 4 prefix \"RFC3964_IPv4_REJECT: \"
REJECT 0 -- ::/0 2002:a9fe::/32 reject-with icmp6-addr-unreachable
LOG 0 -- ::/0 2002:c0a8::/32 LOG flags 0 level 4 prefix \"RFC3964_IPv4_REJECT: \"
REJECT 0 -- ::/0 2002:c0a8::/32 reject-with icmp6-addr-unreachable
LOG 0 -- ::/0 2002:ac10::/28 LOG flags 0 level 4 prefix \"RFC3964_IPv4_REJECT: \"
REJECT 0 -- ::/0 2002:ac10::/28 reject-with icmp6-addr-unreachable
LOG 0 -- ::/0 2002:7f00::/24 LOG flags 0 level 4 prefix \"RFC3964_IPv4_REJECT: \"
REJECT 0 -- ::/0 2002:7f00::/24 reject-with icmp6-addr-unreachable
LOG 0 -- ::/0 2002:a00::/24 LOG flags 0 level 4 prefix \"RFC3964_IPv4_REJECT: \"
REJECT 0 -- ::/0 2002:a00::/24 reject-with icmp6-addr-unreachable
LOG 0 -- ::/0 2002::/24 LOG flags 0 level 4 prefix \"RFC3964_IPv4_REJECT: \"
REJECT 0 -- ::/0 2002::/24 reject-with icmp6-addr-unreachable
LOG 0 -- ::/0 ::ffff:0.0.0.0/96 LOG flags 0 level 4 prefix \"RFC3964_IPv4_REJECT: \"
REJECT 0 -- ::/0 ::ffff:0.0.0.0/96 reject-with icmp6-addr-unreachable
LOG 0 -- ::/0 ::/96 LOG flags 0 level 4 prefix \"RFC3964_IPv4_REJECT: \"
REJECT 0 -- ::/0 ::/96 reject-with icmp6-addr-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT 0 -- ::/0 ::/0
LOG 0 -- ::/0 ::/0 ctstate INVALID LOG flags 0 level 4 prefix \"STATE_INVALID_DROP: \"
DROP 0 -- ::/0 ::/0 ctstate INVALID
FORWARD_direct 0 -- ::/0 ::/0
RFC3964_IPv4 0 -- ::/0 ::/0
FORWARD_POLICIES 0 -- ::/0 ::/0
LOG 0 -- ::/0 ::/0 LOG flags 0 level 4 prefix \"FINAL_REJECT: \"
REJECT 0 -- ::/0 ::/0 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0 ctstate RELATED,ESTABLISHED
ACCEPT 0 -- ::/0 ::/0
OUTPUT_direct 0 -- ::/0 ::/0
RFC3964_IPv4 0 -- ::/0 ::/0
OUTPUT_POLICIES 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi






{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:72: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:72"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }


















    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L RFC3964_IPv4; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L RFC3964_IPv4; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/rfc3964_ipv4.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT 0 -- ::/0 ::/0
LOG 0 -- ::/0 ::/0 ctstate INVALID LOG flags 0 level 4 prefix \"STATE_INVALID_DROP: \"
DROP 0 -- ::/0 ::/0 ctstate INVALID
FORWARD_direct 0 -- ::/0 ::/0
FORWARD_POLICIES 0 -- ::/0 ::/0
LOG 0 -- ::/0 ::/0 LOG flags 0 level 4 prefix \"FINAL_REJECT: \"
REJECT 0 -- ::/0 ::/0 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0 ctstate RELATED,ESTABLISHED
ACCEPT 0 -- ::/0 ::/0
OUTPUT_direct 0 -- ::/0 ::/0
OUTPUT_POLICIES 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "rfc3964_ipv4.at:117" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:117"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_298
#AT_START_299
at_fn_group_banner 299 'service_include.at:1' \
  "service include" "                                " 11
at_xfail=no
(
  $as_echo "299. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/service_include.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/service_include.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "service_include.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_include.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "service_include.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_include.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "service_include.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_include.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "service_include.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:1"





{ set +x
$as_echo "$at_srcdir/service_include.at:4: mkdir -p ./services"
at_fn_check_prepare_trace "service_include.at:4"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:5: cat <<HERE > ./services/my-service-with-include.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol=\"tcp\" port=\"12345\"/>
  <include service=\"ssdp\"/>
  <include service=\"mdns\"/>
  <include service=\"recursive-service\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:5"
( $at_check_trace; cat <<HERE > ./services/my-service-with-include.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol="tcp" port="12345"/>
  <include service="ssdp"/>
  <include service="mdns"/>
  <include service="recursive-service"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:17: cat <<HERE > ./services/recursive-service.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service=\"my-service-with-include\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:17"
( $at_check_trace; cat <<HERE > ./services/recursive-service.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service="my-service-with-include"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/service_include.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/service_include.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=drop --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=drop --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=drop --add-service=my-service-with-include "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=drop --add-service=my-service-with-include
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=drop --list-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=drop --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=drop --add-service=recursive-service "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=drop --add-service=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=drop --remove-service=recursive-service "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=drop --remove-service=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd    --zone=drop --add-rich-rule='rule service name=recursive-service log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd    --zone=drop --add-rich-rule='rule service name=recursive-service log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=drop --list-rich-rules "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=drop --list-rich-rules
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "rule service name=\"recursive-service\" log
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/service_include.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_drop_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_drop_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 17 -- 0.0.0.0/0 239.255.255.250 udp dpt:1900
ACCEPT 17 -- 0.0.0.0/0 224.0.0.251 udp dpt:5353
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:12345
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/service_include.at:69:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_drop_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:69"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_drop_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 17 -- ::/0 ff02::c udp dpt:1900
ACCEPT 17 -- ::/0 ff02::fb udp dpt:5353
ACCEPT 6 -- ::/0 ::/0 tcp dpt:12345
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/service_include.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_drop_log; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_drop_log; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG 17 -- 0.0.0.0/0 239.255.255.250 udp dpt:1900 LOG flags 0 level 4
LOG 17 -- 0.0.0.0/0 224.0.0.251 udp dpt:5353 LOG flags 0 level 4
LOG 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:12345 LOG flags 0 level 4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/service_include.at:79:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_drop_log; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:79"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_drop_log; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG 17 -- ::/0 ff02::c udp dpt:1900 LOG flags 0 level 4
LOG 17 -- ::/0 ff02::fb udp dpt:5353 LOG flags 0 level 4
LOG 6 -- ::/0 ::/0 tcp dpt:12345 LOG flags 0 level 4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/service_include.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=recursive-service "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --add-include=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/service_include.at:89: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:89"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/service_include.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --remove-include=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/service_include.at:92: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:92"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/service_include.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --get-includes "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:118: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service" "service_include.at:118"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:119: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh" "service_include.at:119"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:120: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:120"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:121: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:121"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:121"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:122: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh" "service_include.at:122"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:123: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:123"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:124: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:124"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:125: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes" "service_include.at:125"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:128: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }"
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:128"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:128"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/service_include.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --add-include=does-not-exist "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --add-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/service_include.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }





    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:141: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --add-include=does-not-exist"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --add-include=does-not-exist" "service_include.at:141"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --add-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/service_include.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }





        if test x"-e '/ERROR: INVALID_SERVICE:/d'" != x"ignore"; then
            $as_echo "service_include.at:143" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_SERVICE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:143"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_299
#AT_START_300
at_fn_group_banner 300 'helpers_custom.at:1' \
  "customer helpers" "                               " 11
at_xfail=no
(
  $as_echo "300. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "helpers_custom.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/helpers_custom.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "helpers_custom.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "helpers_custom.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "helpers_custom.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:1"








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-helper=\"ftptest\" --module=\"nf_conntrack_ftp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-helper="ftptest" --module="nf_conntrack_ftp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --helper=ftptest --add-port=\"2121/tcp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --helper=ftptest --add-port="2121/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-service=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-service="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --query-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --query-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-port=\"2121/tcp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-port="2121/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules: ftptest
destination:
includes:
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules: ftptest
destination:
includes:
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=ftptest "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=ftptest
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/helpers_custom.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "CT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 CT helper ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/helpers_custom.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/helpers_custom.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "CT 6 -- ::/0 ::/0 tcp dpt:2121 CT helper ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/helpers_custom.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:22
ACCEPT 17 -- ::/0 fe80::/64 udp dpt:546
ACCEPT 6 -- ::/0 ::/0 tcp dpt:2121
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/helpers_custom.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --remove-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --remove-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --query-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --query-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/helpers_custom.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-helper=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-helper="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules:
destination:
includes:
helpers: ftptest
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules:
destination:
includes:
helpers: ftptest
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=ftptest "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=ftptest
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/helpers_custom.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "CT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 CT helper ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/helpers_custom.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/helpers_custom.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "CT 6 -- ::/0 ::/0 tcp dpt:2121 CT helper ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/helpers_custom.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:22
ACCEPT 17 -- ::/0 fe80::/64 udp dpt:546
ACCEPT 6 -- ::/0 ::/0 tcp dpt:2121
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/helpers_custom.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --remove-helper=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --remove-helper="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-helper=\"ftp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-helper="ftp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-port=\"21/tcp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-port="21/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/helpers_custom.at:122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=ftptest "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=ftptest
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/helpers_custom.at:136:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:136"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "CT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 CT helper ftp
CT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 CT helper ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:136"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/helpers_custom.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121
ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:21
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/helpers_custom.at:145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PRE_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PRE_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "CT 6 -- ::/0 ::/0 tcp dpt:21 CT helper ftp
CT 6 -- ::/0 ::/0 tcp dpt:2121 CT helper ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:145"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/helpers_custom.at:149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:22
ACCEPT 17 -- ::/0 fe80::/64 udp dpt:546
ACCEPT 6 -- ::/0 ::/0 tcp dpt:2121
ACCEPT 6 -- ::/0 ::/0 tcp dpt:21
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:149"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "helpers_custom.at:156" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:156"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_300
#AT_START_301
at_fn_group_banner 301 'policy.at:5' \
  "policy - xml" "                                   " 11
at_xfail=no
(
  $as_echo "301. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:5: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:5"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:5: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:5" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:5"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:5"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:5"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:5" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:5"





{ set +x
$as_echo "$at_srcdir/policy.at:8: mkdir -p ./policies"
at_fn_check_prepare_trace "policy.at:8"
( $at_check_trace; mkdir -p ./policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }


cat >./policies/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<policy target="CONTINUE" priority="-123">
<short>foobar</short>
<description>foobar policy</description>
<ingress-zone name="public" />
<egress-zone name="ANY" />
<service name="ssh" />
<service name="https" />
<port port="1234" protocol="tcp" />
<icmp-block name="echo-request" />
<masquerade />
<forward-port port="1234" protocol="tcp" to-port="4321" to-addr="10.10.10.1" />
<source-port port="1234" protocol="udp" />
<protocol value="ipv6-icmp" />
<rule family="ipv4">
    <source address="10.10.10.0/24" />
    <destination address="192.168.10.0/24" />
    <service name="ssh" />
    <accept>
        <limit value="5/m" />
    </accept>
</rule>
<rule>
    <port port="1234" protocol="tcp" />
    <reject />
</rule>
<rule family="ipv4">
    <source address="10.10.10.0/24" />
    <icmp-block name="echo-request" />
</rule>
<rule>
    <icmp-type name="echo-reply" />
    <drop />
</rule>
<rule family="ipv4">
    <forward-port port="1234" protocol="tcp" to-port="4321" to-addr="10.10.10.1" />
</rule>
<rule>
    <source-port port="1234" protocol="udp" />
    <log prefix="LOG: " level="warning" />
</rule>
<rule>
    <source-port port="1234" protocol="tcp" />
    <nflog group="1" prefix="NFLOG: " queue-size="10">
        <limit value="5/m" />
    </nflog>
</rule>
<rule family="ipv6">
    <protocol value="ipv6-icmp" />
    <audit />
    <accept />
</rule>
<rule family="ipv4">
    <destination address="192.168.10.0/24" />
    <mark set="123" />
</rule>
</policy>
_ATEOF




    { set +x
$as_echo "$at_srcdir/policy.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "policy.at:73" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:73"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_301
#AT_START_302
at_fn_group_banner 302 'policy.at:79' \
  "policy - create" "                                " 11
at_xfail=no
(
  $as_echo "302. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:79: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:79"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:79: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:79"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:79: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:79"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:79: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:79"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:79" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:79"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:79" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:79"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:79" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:79"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:79" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:79"








    { set +x
$as_echo "$at_srcdir/policy.at:83:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy worldToHost "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:83"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy worldToHost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy hostToWorld "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy hostToWorld
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:85:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy zoneToZone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:85"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy zoneToZone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 hostToWorld worldToHost zoneToZone
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 hostToWorld worldToHost zoneToZone
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:94" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:94"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_302
#AT_START_303
at_fn_group_banner 303 'policy.at:96' \
  "policy - name" "                                  " 11
at_xfail=no
(
  $as_echo "303. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:96: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:96"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:96: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:96"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:96: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:96"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:96: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:96"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:96" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:96"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:96" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:96"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:96" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:96"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:96" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:96"








    { set +x
$as_echo "$at_srcdir/policy.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy 123456789012345678 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy 123456789012345678
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy 1234567890123456789 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy 1234567890123456789
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 116 $at_status "$at_srcdir/policy.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/policy.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone allow-host-ipv6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone allow-host-ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/policy.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_NAME:/d' -e '/ERROR: NAME_CONFLICT:/d'" != x"ignore"; then
            $as_echo "policy.at:107" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_NAME:/d' -e '/ERROR: NAME_CONFLICT:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:107"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_303
#AT_START_304
at_fn_group_banner 304 'policy.at:109' \
  "policy - list" "                                  " 11
at_xfail=no
(
  $as_echo "304. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:109: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:109"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:109: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:109"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:109: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:109"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:109: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:109"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:109" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:109"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:109" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:109"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:109" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:109"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:109" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:109"








    { set +x
$as_echo "$at_srcdir/policy.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-policy allow-host-ipv6 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-policy allow-host-ipv6 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-policy allow-host-ipv6 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-policy allow-host-ipv6 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:131"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:151:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all-policies | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:151"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all-policies | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:151"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:170:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-all-policies | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:170"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-all-policies | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:190:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:190"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:190"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:209:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:209"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:209"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:229" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:229"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_304
#AT_START_305
at_fn_group_banner 305 'policy.at:231' \
  "policy - options" "                               " 11
at_xfail=no
(
  $as_echo "305. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:231: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:231"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:231: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:231"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:231: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:231"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:231: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:231"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:231" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:231"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:231" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:231"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:231" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:231"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:231" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:231"








    { set +x
$as_echo "$at_srcdir/policy.at:235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:235"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:240:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:240"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:240"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:241:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:241"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:241"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:242:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:242"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:244:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:244"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-interfaces "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-interfaces "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:249"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:250:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:250"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:250"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:251"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:259:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:259"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:259"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:260:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:260"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:260"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:261:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:261"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:261"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:262:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:262"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:262"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:263:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:263"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:263"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:264:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:264"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:264"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-egress-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-egress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:271:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:271"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:271"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:272:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:272"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:272"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-egress-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-egress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:274"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:275"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:276:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:276"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:278:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-ingress-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:278"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-ingress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:281:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:281"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:281"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-ingress-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-ingress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:284" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:284"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_305
#AT_START_306
at_fn_group_banner 306 'policy.at:286' \
  "policy - priority" "                              " 11
at_xfail=no
(
  $as_echo "306. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:286: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:286"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:286: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:286"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:286: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:286"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:286: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:286"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:286" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:286"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:286" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:286"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:286" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:286"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:286" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:286"








    { set +x
$as_echo "$at_srcdir/policy.at:289:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-interface dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:289"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-interface dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:289"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy worldToHost "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy worldToHost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:293"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:294:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:294"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --get-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-1
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:296"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/policy.at:314:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:314"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_worldToHost 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_worldToHost 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:314"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:324:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:324"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_worldToHost 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_worldToHost 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:324"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority 1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority 1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:336"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/policy.at:352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
IN_worldToHost 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
IN_worldToHost 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
IN_worldToHost 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
IN_worldToHost 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:362"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:374:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy first "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:374"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy first
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:374"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy first --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy first --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:376:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy first --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:376"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy first --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:377:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy second "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:377"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy second
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:377"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:378:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy second --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:378"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy second --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:378"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy second --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy second --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:380:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy third "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:380"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy third
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:380"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:381:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy third --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:381"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy third --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:381"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:382:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy third --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:382"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy third --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:382"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:383:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy fourth "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:383"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy fourth
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:383"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:384:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fourth --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:384"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fourth --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:384"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:385:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fourth --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:385"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fourth --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:385"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:386:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy fifth "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:386"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy fifth
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:386"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:387:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fifth --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:387"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fifth --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:387"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:388:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fifth --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:388"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fifth --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:388"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:390:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fourth --set-priority -100 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:390"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fourth --set-priority -100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:390"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:391:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy second --set-priority -5000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:391"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy second --set-priority -5000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:391"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:392:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy first --set-priority -10000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:392"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy first --set-priority -10000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:392"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:393:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy third --set-priority -1000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:393"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy third --set-priority -1000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:393"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:394:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fifth --set-priority -10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:394"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fifth --set-priority -10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:395:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:395"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:395"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:395:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:395"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:395"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/policy.at:420:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:420"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_first 0 -- 0.0.0.0/0 0.0.0.0/0
IN_second 0 -- 0.0.0.0/0 0.0.0.0/0
IN_third 0 -- 0.0.0.0/0 0.0.0.0/0
IN_fourth 0 -- 0.0.0.0/0 0.0.0.0/0
IN_fifth 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
IN_worldToHost 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_first 0 -- 0.0.0.0/0 0.0.0.0/0
IN_second 0 -- 0.0.0.0/0 0.0.0.0/0
IN_third 0 -- 0.0.0.0/0 0.0.0.0/0
IN_fourth 0 -- 0.0.0.0/0 0.0.0.0/0
IN_fifth 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
IN_worldToHost 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:420"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:440:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:440"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_first 0 -- ::/0 ::/0
IN_second 0 -- ::/0 ::/0
IN_third 0 -- ::/0 ::/0
IN_fourth 0 -- ::/0 ::/0
IN_fifth 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
IN_worldToHost 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_first 0 -- ::/0 ::/0
IN_second 0 -- ::/0 ::/0
IN_third 0 -- ::/0 ::/0
IN_fourth 0 -- ::/0 ::/0
IN_fifth 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
IN_worldToHost 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:440"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:462:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority 0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:462"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/policy.at:462"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/policy.at:463:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -32769 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:463"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -32769
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/policy.at:463"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:464:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:464"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:464"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:465:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority  32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:465"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority  32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/policy.at:465"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:466:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority  32767 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:466"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority  32767
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:466"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_PRIORITY/d'" != x"ignore"; then
            $as_echo "policy.at:468" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_PRIORITY/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:468"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_306
#AT_START_307
at_fn_group_banner 307 'policy.at:470' \
  "policy - zones" "                                 " 11
at_xfail=no
(
  $as_echo "307. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:470: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:470"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:470: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:470"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:470: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:470"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:470: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:470"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:470" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:470"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:470" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:470"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:470" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:470"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:470" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:470"








    { set +x
$as_echo "$at_srcdir/policy.at:473:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:473"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:473"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:474:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:474"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:476:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:476"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:476"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:477:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:477"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:477"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:478:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:478"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:478"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:478:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:478"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:478"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:481:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:481"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:481"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:482:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:482"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:482"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:483:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:483"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:483"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:484:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:484"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:484"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:485:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:485"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:485"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:486:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:486"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:486"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:487:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:487"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:487"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:488:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:488"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:488"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:489:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:489"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:489"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:490:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:490"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:490"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:491:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:491"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:491"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:492:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:492"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:493:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:493"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:493"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:494:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:494"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:494"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:495:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:495"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:495"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:496:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:496"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:496"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:497:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:497"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:497"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:498:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:498"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:499:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:499"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:499"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:500:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:500"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:500"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:501:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:501"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:502:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:502"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:502"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:503:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:503"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:503"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:504:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:504"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:504"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:505:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:505"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:505"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:506:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:506"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:506"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:507:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:507"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:507"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:508:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:508"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:508"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:509:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:509"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:509"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:510:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:510"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:510"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:511:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:511"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:511"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:512:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:512"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:512"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:513"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:514:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:514"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:514"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:515:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:515"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:515"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:516:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:516"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:516"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:517"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:518:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:518"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:518"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:519:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:519"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:519"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:520:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:520"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:520"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:523:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:523"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:523"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:524:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:524"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:524"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:525:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:525"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:525"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:526:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:526"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:526"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:527:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:527"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:527"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:528:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:528"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:528"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:529:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:529"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:529"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:530:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:530"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:530"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:531:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:531"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:531"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:532:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:532"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:532"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:533:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:533"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:534:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:534"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:534"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:535:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:535"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:535"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:536:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:536"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:536"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:537:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:537"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:537"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:538:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:538"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:538"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:539:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:539"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:539"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:540:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:540"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:540"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:541:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:541"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:541"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:542:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:542"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:542"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:543:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:543"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:543"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:544:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:544"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:544"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:545:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:545"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:545"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:546:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:546"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:546"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:547"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:548:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:548"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:548"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:549:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:549"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:549"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:550:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:550"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:550"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:553:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:553"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:553"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:554:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:554"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:554"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:555:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:555"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:555"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:556:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:556"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:556"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:557:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:557"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:557"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:558:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:558"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:558"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:559:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:559"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:559"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:560:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:560"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:560"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:561:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:561"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:561"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:562:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:562"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:562"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:563:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:563"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:563"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:564:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:564"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:564"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:567:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:567"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:567"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:568:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:568"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:568"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:569:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:569"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:569"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:570:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:570"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:570"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:571:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:571"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:571"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:572:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:572"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:572"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:573:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:573"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:573"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:574:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:574"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:574"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:575:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:575"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:575"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:576:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:576"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:576"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:577:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:577"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:577"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:578:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:578"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:578"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:581:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:581"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:581"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:582:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:582"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:582"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:583:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:583"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:583"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:584:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:584"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:584"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:585:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:585"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:585"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:586:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:586"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:586"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:589:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"does_not_exist\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:589"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:589"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:590:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"does_not_exist\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:590"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:590"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:591:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"does_not_exist\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:591"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:591"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:592:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"does_not_exist\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:592"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:592"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:597:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:597"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:597"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:598:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:598"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:598"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:598:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:598"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:598"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:599:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:599"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:599"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:628:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:628"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:628"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:648:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:648"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:648"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:668:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:668"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:668"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:669"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:669"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:670:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:670"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
foobar
  ingress-zones: public
  egress-zones: internal
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:670"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:704:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:704"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:704"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:726:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:726"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:726"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:748:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:748"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:748"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:749:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:749"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:749"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:749:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:749"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:749"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:750:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:750"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:750"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:779:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:779"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:779"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:799:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:799"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:799"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"-e '/ERROR: INVALID_ZONE:/d'" != x"ignore"; then
            $as_echo "policy.at:820" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ZONE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:820"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_307
#AT_START_308
at_fn_group_banner 308 'policy.at:822' \
  "policy - dispatch" "                              " 11
at_xfail=no
(
  $as_echo "308. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:822: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:822"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:822: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:822"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:822: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:822"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:822: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:822"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:822" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:822"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:822" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:822"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:822" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:822"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:822" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:822"








    { set +x
$as_echo "$at_srcdir/policy.at:825:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:825"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:825"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:826:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:826"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:826"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:828:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:828"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:828"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:829:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:829"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:829"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:830:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:830"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:830"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:830:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:830"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:830"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:832:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:832"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:832"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/policy.at:842:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:842"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct 0 -- 0.0.0.0/0 0.0.0.0/0
PREROUTING_POLICIES 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:842"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:846:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:846"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct 0 -- ::/0 ::/0
PREROUTING_POLICIES 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:846"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:858:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:858"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct 0 -- 0.0.0.0/0 0.0.0.0/0
PREROUTING_POLICIES 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:858"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:862:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:862"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct 0 -- ::/0 ::/0
PREROUTING_POLICIES 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:862"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:875:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L OUTPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:875"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L OUTPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUTPUT_direct 0 -- 0.0.0.0/0 0.0.0.0/0
OUTPUT_POLICIES 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:875"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:879:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L OUTPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:879"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L OUTPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUTPUT_direct 0 -- ::/0 ::/0
OUTPUT_POLICIES 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:879"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:891:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:891"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POSTROUTING_direct 0 -- 0.0.0.0/0 0.0.0.0/0
POSTROUTING_POLICIES 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:891"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:895:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:895"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POSTROUTING_direct 0 -- ::/0 ::/0
POSTROUTING_POLICIES 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:895"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:907:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:907"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct 0 -- 0.0.0.0/0 0.0.0.0/0
PREROUTING_POLICIES 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:907"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:913:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:913"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 58 -- ::/0 ::/0 ipv6-icmptype 134
ACCEPT 58 -- ::/0 ::/0 ipv6-icmptype 135
DROP 0 -- ::/0 ::/0 rpfilter validmark invert
PREROUTING_direct 0 -- ::/0 ::/0
PREROUTING_POLICIES 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:913"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:933:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:933"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
DROP 0 -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
INPUT_direct 0 -- 0.0.0.0/0 0.0.0.0/0
INPUT_POLICIES 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:933"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:941:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:941"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT 0 -- ::/0 ::/0
DROP 0 -- ::/0 ::/0 ctstate INVALID
INPUT_direct 0 -- ::/0 ::/0
INPUT_POLICIES 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:941"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:963:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:963"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
DROP 0 -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
FORWARD_direct 0 -- 0.0.0.0/0 0.0.0.0/0
FORWARD_POLICIES 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:963"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:971:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:971"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT 0 -- ::/0 ::/0
DROP 0 -- ::/0 ::/0 ctstate INVALID
FORWARD_direct 0 -- ::/0 ::/0
RFC3964_IPv4 0 -- ::/0 ::/0
FORWARD_POLICIES 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:971"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:991:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:991"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
OUTPUT_direct 0 -- 0.0.0.0/0 0.0.0.0/0
OUTPUT_POLICIES 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:991"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:997:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:997"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- ::/0 ::/0 ctstate RELATED,ESTABLISHED
ACCEPT 0 -- ::/0 ::/0
OUTPUT_direct 0 -- ::/0 ::/0
RFC3964_IPv4 0 -- ::/0 ::/0
OUTPUT_POLICIES 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:997"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:1007:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1007"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1007"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1008:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1008"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1008"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1009:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1009"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
foobar
  ingress-zones: public
  egress-zones: HOST
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1009"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:1035:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1035"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1035"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1048:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1048"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_foobar 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_foobar 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1048"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1074:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1074"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1074"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1082:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1082"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1115"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1135"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:1156:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1156"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1156"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1169:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1169"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1169"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1198:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1198"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1198"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1209:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1209"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1209"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1236"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1247:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1247"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1247"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1283"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1291"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1312:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1312"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1312"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1320:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1320"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1320"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:1328:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1328"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1328"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1329:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1329"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1329"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1333:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1333"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1333"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1334:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1334"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1334"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
IN_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_foobar 0 -- ::/0 ::/0
IN_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_foobar 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_foobar 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1368"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1395:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1395"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1395"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1403:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1403"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1403"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1436:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1436"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1436"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1456:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1456"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1456"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:1477:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1477"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1477"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1491:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1491"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1491"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1524:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1524"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1524"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1538:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1538"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1538"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1571:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1571"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1571"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1585:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1585"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1585"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1624:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1624"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1624"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1632:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1632"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1632"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1653:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1653"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1653"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1661:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1661"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1661"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:1669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1669"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1670:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1670"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1670"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1674:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1674"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1674"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1675:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1675"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1675"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:1692:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1692"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1692"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1703:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1703"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1703"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1729:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1729"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1729"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1739:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1739"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_foobar 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_foobar 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1739"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1774:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1774"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1774"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1794:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1794"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1794"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:1815:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1815"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1815"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1826:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1826"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1826"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1853:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1853"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1853"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1864:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1864"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1864"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1891:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1891"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1891"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1902:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1902"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1902"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1938"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1946:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1946"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1946"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1969:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1969"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1969"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1979:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1979"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_foobar 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_foobar 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1979"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:1989:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1989"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1989"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1990:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1990"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1990"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1994:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1994"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1994"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1995:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1995"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1995"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:2012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2012"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2023"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:2050:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2050"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2050"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2061:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2061"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_foobar 0 -- ::/0 ::/0
OUT_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_foobar 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_foobar 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2061"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:2097:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2097"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2097"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2117"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:2138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2138"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2149"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:2176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2176"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2187:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2187"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2187"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:2214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2214"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2225:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2225"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2225"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:2261:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2261"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2261"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2269"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:2293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2293"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2304:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2304"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_foobar 0 -- ::/0 ::/0
OUT_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_foobar 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_foobar 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2304"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:2315:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2315"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2315"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2316:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2316"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2316"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:2320:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2320"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2320"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2321:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2321"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2321"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:2338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2338"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2349"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:2373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2373"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2381:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2381"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2381"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:2422:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2422"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2422"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2450:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2450"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2450"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:2479:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2479"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2479"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2493:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2493"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2493"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:2526:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2526"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2526"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2540:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2540"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2540"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:2573:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2573"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2573"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2587:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2587"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2587"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:2634:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2634"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
POST_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2634"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2645:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2645"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_foobar 0 -- ::/0 ::/0
POST_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_foobar 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_foobar 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2645"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:2669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2669"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2677:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2677"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2677"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:2685:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2685"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2685"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2686:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2686"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2686"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:2690:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2690"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2690"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2691:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2691"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2691"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:2708:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2708"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2708"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2719:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2719"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2719"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:2743:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2743"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2743"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2751:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2751"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2751"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:2789:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2789"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2789"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2814:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2814"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2814"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:2840:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2840"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2840"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2854:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2854"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2854"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:2884:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2884"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2884"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2895:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2895"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2895"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:2922:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2922"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2922"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2933:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2933"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2933"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:2974:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2974"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2974"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2984:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2984"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_foobar 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_foobar 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2984"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:3007:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3007"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3007"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3015"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:3023:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3023"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3023"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3024"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3025"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:3029:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3029"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3029"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3030"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3031:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3031"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3031"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:3048:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3048"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
IN_internal 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3048"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3059:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3059"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3059"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:3080:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3080"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3080"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3088:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3088"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3088"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:3122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar 0 -- 10.10.10.0/24 10.10.10.0/24
FWD_internal 0 -- 10.10.10.0/24 10.10.10.0/24
REJECT 0 -- 10.10.10.0/24 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_internal 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_internal 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 10.10.10.0/24
FWD_public 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 10.10.10.0/24
FWD_public 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3122"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3145"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:3156:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3156"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_foobar 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_internal 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3156"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3170:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3170"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3170"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:3203:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3203"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_foobar 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_internal 0 -- 10.10.10.0/24 10.10.10.0/24
RETURN 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_internal 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3203"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3223"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:3256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_foobar 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_internal 0 -- 10.10.10.0/24 10.10.10.0/24
RETURN 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_internal 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3256"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3276:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3276"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3276"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:3312:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3312"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_foobar 0 -- 10.10.10.0/24 10.10.10.0/24
POST_internal 0 -- 10.10.10.0/24 10.10.10.0/24
RETURN 0 -- 10.10.10.0/24 10.10.10.0/24
POST_foobar 0 -- 0.0.0.0/0 10.10.10.0/24
POST_internal 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
POST_public 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3312"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3328:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3328"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3328"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:3347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3347"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3355"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:3361:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3361"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3361"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3363"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:3367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3369"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:3386:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3386"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3386"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3397:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3397"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3397"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:3421:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3421"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3421"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3429:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3429"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3429"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:3465:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3465"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3465"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3488:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3488"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3488"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:3512:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3512"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3512"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3524:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3524"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3524"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:3553:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3553"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3553"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3565:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3565"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3565"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:3594:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3594"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3594"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3606:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3606"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3606"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:3646:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3646"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3646"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3654:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3654"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3654"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:3675:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3675"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3675"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3683:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3683"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3683"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:3691:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3691"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3691"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3692:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3692"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3692"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3693:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3693"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3693"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:3697:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3697"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3697"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3698:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3698"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3698"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:3699:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:3699"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3699"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:3716:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3716"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
IN_internal 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3716"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3727:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3727"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3727"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:3748:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3748"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3748"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3756:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3756"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3756"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:3790:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3790"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar 0 -- 10.10.10.0/24 10.10.10.0/24
FWD_internal 0 -- 10.10.10.0/24 10.10.10.0/24
REJECT 0 -- 10.10.10.0/24 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_foobar 0 -- 10.10.10.0/24 0.0.0.0/0
FWD_internal 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 10.10.10.0/24 0.0.0.0/0
FWD_internal 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3790"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3813:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3813"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3813"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:3824:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3824"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_foobar 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_foobar 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_internal 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3824"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3837:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3837"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3837"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:3869:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3869"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_foobar 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_internal 0 -- 10.10.10.0/24 10.10.10.0/24
RETURN 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_foobar 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_internal 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3869"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3888:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3888"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3888"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:3920:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3920"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_foobar 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_internal 0 -- 10.10.10.0/24 10.10.10.0/24
RETURN 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_foobar 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_internal 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3920"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3939"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:3975:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3975"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_foobar 0 -- 10.10.10.0/24 10.10.10.0/24
POST_internal 0 -- 10.10.10.0/24 10.10.10.0/24
RETURN 0 -- 10.10.10.0/24 10.10.10.0/24
POST_internal 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
POST_foobar 0 -- 10.10.10.0/24 0.0.0.0/0
POST_public 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_foobar 0 -- 10.10.10.0/24 0.0.0.0/0
POST_public 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3975"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:3992:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:3992"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:3992"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4011"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4019:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4019"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4019"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:4025:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4025"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4025"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4026"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4027"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:4032:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4032"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4032"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4033:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4033"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4033"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4034"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:4051:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4051"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4051"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4062:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4062"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4062"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4086:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4086"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4086"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4094:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4094"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4094"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4129:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4129"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4129"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4151:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4151"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4151"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:4174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4174"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4186:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4186"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4186"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4214"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4225:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4225"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4225"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4252"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4263:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4263"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4263"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4301:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4301"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4301"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4309:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4309"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4309"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4330:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4330"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4330"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4338"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:4346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4349"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:4354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4356:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4356"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4356"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4357:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4357"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4357"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:4374:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4374"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
IN_public 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4374"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4385:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4385"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4385"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4406:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4406"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
OUT_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4406"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4414:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4414"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4414"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4447:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4447"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_public 0 -- 10.10.10.0/24 10.10.10.0/24
REJECT 0 -- 10.10.10.0/24 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 10.10.10.0/24
FWD_internal 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4447"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4469:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4469"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4469"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:4481:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4481"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_public 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4481"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4494:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4494"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4494"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4527:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4527"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_public 0 -- 10.10.10.0/24 10.10.10.0/24
RETURN 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_public 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_internal 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4527"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4546:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4546"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4546"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4579:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4579"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_public 0 -- 10.10.10.0/24 10.10.10.0/24
RETURN 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_public 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_internal 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4579"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4598:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4598"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4598"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4634:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4634"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_public 0 -- 10.10.10.0/24 10.10.10.0/24
RETURN 0 -- 10.10.10.0/24 10.10.10.0/24
POST_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
POST_internal 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
POST_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_public 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4634"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4648:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4648"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4648"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4667:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4667"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
OUT_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4667"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4675:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4675"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4675"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:4681:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4681"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4681"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4682:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4682"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4682"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4683:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4683"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4683"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4684:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4684"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4684"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:4689:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4689"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4689"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4690:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4690"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4690"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4691:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4691"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4691"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:4692:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:4692"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4692"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:4709:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4709"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
IN_internal 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4709"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4720:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4720"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4720"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4741:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4741"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4741"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4749:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4749"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4749"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4782:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4782"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 10.10.10.0/24 10.10.10.0/24
REJECT 0 -- 10.10.10.0/24 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_foobar 0 -- 10.10.10.0/24 0.0.0.0/0
FWD_internal 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 10.10.10.0/24 0.0.0.0/0
FWD_internal 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4782"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4804"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:4815:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4815"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_foobar 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_internal 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4815"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4827:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4827"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4827"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4857:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4857"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_internal 0 -- 10.10.10.0/24 10.10.10.0/24
RETURN 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_internal 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4857"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4874:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4874"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4874"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4904:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4904"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_internal 0 -- 10.10.10.0/24 10.10.10.0/24
RETURN 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_internal 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4904"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4921:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4921"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4921"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4956:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4956"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_internal 0 -- 10.10.10.0/24 10.10.10.0/24
RETURN 0 -- 10.10.10.0/24 10.10.10.0/24
POST_internal 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
POST_foobar 0 -- 10.10.10.0/24 0.0.0.0/0
POST_public 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
POST_foobar 0 -- 10.10.10.0/24 0.0.0.0/0
POST_public 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4956"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4972:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4972"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4972"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:4991:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4991"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4991"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:4999:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:4999"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:4999"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:5005:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5005"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5005"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5006:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5006"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5006"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5007:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5007"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5007"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5008:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5008"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5008"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:5013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=10.20.20.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=10.20.20.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5014"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5015"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5016:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5016"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5016"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:5033:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5033"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
IN_internal 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 10.20.20.0/24 0.0.0.0/0
IN_public 0 -- 10.20.20.0/24 0.0.0.0/0
REJECT 0 -- 10.20.20.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5033"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5044:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5044"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5044"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:5062:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5062"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
OUT_public 0 -- 0.0.0.0/0 10.20.20.0/24
RETURN 0 -- 0.0.0.0/0 10.20.20.0/24
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5062"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5070:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5070"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5070"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:5101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 10.10.10.0/24 10.10.10.0/24
REJECT 0 -- 10.10.10.0/24 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_foobar 0 -- 10.10.10.0/24 10.20.20.0/24
FWD_internal 0 -- 10.10.10.0/24 10.20.20.0/24
REJECT 0 -- 10.10.10.0/24 10.20.20.0/24 reject-with icmp-port-unreachable
FWD_foobar 0 -- 10.10.10.0/24 0.0.0.0/0
FWD_internal 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 10.20.20.0/24 10.10.10.0/24
REJECT 0 -- 10.20.20.0/24 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 10.20.20.0/24 10.20.20.0/24
REJECT 0 -- 10.20.20.0/24 10.20.20.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 10.20.20.0/24 0.0.0.0/0
REJECT 0 -- 10.20.20.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 10.20.20.0/24
REJECT 0 -- 0.0.0.0/0 10.20.20.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5101"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5123"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:5128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_foobar 0 -- 10.10.10.0/24 10.20.20.0/24
PRE_foobar 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_internal 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 10.20.20.0/24 0.0.0.0/0
PRE_public 0 -- 10.20.20.0/24 0.0.0.0/0
RETURN 0 -- 10.20.20.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5128"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5141"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:5176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_internal 0 -- 10.10.10.0/24 10.10.10.0/24
RETURN 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_foobar 0 -- 10.10.10.0/24 10.20.20.0/24
PRE_internal 0 -- 10.10.10.0/24 10.20.20.0/24
RETURN 0 -- 10.10.10.0/24 10.20.20.0/24
PRE_foobar 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_internal 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 10.20.20.0/24 0.0.0.0/0
PRE_public 0 -- 10.20.20.0/24 10.10.10.0/24
RETURN 0 -- 10.20.20.0/24 10.10.10.0/24
PRE_public 0 -- 10.20.20.0/24 10.20.20.0/24
RETURN 0 -- 10.20.20.0/24 10.20.20.0/24
PRE_public 0 -- 10.20.20.0/24 0.0.0.0/0
RETURN 0 -- 10.20.20.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 10.20.20.0/24
RETURN 0 -- 0.0.0.0/0 10.20.20.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5176"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5201:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5201"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5201"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:5236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_internal 0 -- 10.10.10.0/24 10.10.10.0/24
RETURN 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_foobar 0 -- 10.10.10.0/24 10.20.20.0/24
PRE_internal 0 -- 10.10.10.0/24 10.20.20.0/24
RETURN 0 -- 10.10.10.0/24 10.20.20.0/24
PRE_foobar 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_internal 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 10.20.20.0/24 0.0.0.0/0
PRE_public 0 -- 10.20.20.0/24 10.10.10.0/24
RETURN 0 -- 10.20.20.0/24 10.10.10.0/24
PRE_public 0 -- 10.20.20.0/24 10.20.20.0/24
RETURN 0 -- 10.20.20.0/24 10.20.20.0/24
PRE_public 0 -- 10.20.20.0/24 0.0.0.0/0
RETURN 0 -- 10.20.20.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 10.20.20.0/24
RETURN 0 -- 0.0.0.0/0 10.20.20.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5236"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5261:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5261"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5261"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:5293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_internal 0 -- 10.10.10.0/24 10.10.10.0/24
RETURN 0 -- 10.10.10.0/24 10.10.10.0/24
POST_internal 0 -- 10.20.20.0/24 10.10.10.0/24
RETURN 0 -- 10.20.20.0/24 10.10.10.0/24
POST_internal 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
POST_foobar 0 -- 10.10.10.0/24 10.20.20.0/24
POST_public 0 -- 10.10.10.0/24 10.20.20.0/24
RETURN 0 -- 10.10.10.0/24 10.20.20.0/24
POST_public 0 -- 10.20.20.0/24 10.20.20.0/24
RETURN 0 -- 10.20.20.0/24 10.20.20.0/24
POST_public 0 -- 0.0.0.0/0 10.20.20.0/24
RETURN 0 -- 0.0.0.0/0 10.20.20.0/24
POST_foobar 0 -- 10.10.10.0/24 0.0.0.0/0
POST_public 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
POST_public 0 -- 10.20.20.0/24 0.0.0.0/0
RETURN 0 -- 10.20.20.0/24 0.0.0.0/0
POST_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5293"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5315:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5315"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5315"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:5332:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5332"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_internal 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
OUT_public 0 -- 0.0.0.0/0 10.20.20.0/24
RETURN 0 -- 0.0.0.0/0 10.20.20.0/24
OUT_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5332"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L OUTPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5340"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:5344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-source=10.20.20.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-source=10.20.20.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5347"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:5349" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:5349"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_308
#AT_START_309
at_fn_group_banner 309 'policy.at:5351' \
  "policy - interfaces/sources" "                    " 11
at_xfail=no
(
  $as_echo "309. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:5351: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5351"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5351"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:5351: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:5351"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5351"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:5351: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:5351"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5351"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:5351: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5351"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5351"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:5351" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:5351"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:5351" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:5351"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:5351" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:5351"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:5351" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:5351"








    { set +x
$as_echo "$at_srcdir/policy.at:5354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5356:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5356"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5356"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5357:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5357"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5357"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:5358:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5358"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5358"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:5358:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5358"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5358"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/policy.at:5374:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5374"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5374"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5385:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5385"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5385"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:5400:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5400"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5400"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:5417:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5417"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5417"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5429:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5429"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5429"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:5467:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5467"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5467"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5489:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5489"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5489"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:5514:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-interface foobar2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5514"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-interface foobar2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5514"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:5534:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5534"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5534"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5549:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5549"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5549"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:5605:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5605"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5605"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5642:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5642"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5642"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:5682:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --remove-interface foobar2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5682"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --remove-interface foobar2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5682"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:5699:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5699"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5699"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5711:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5711"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5711"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:5749:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5749"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5749"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5771:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5771"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5771"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:5797:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --remove-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5797"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --remove-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5797"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:5811:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5811"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5811"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5820:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5820"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5820"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:5844:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5844"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5844"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5855:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5855"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5855"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:5870:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5870"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5870"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:5894:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5894"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_public 0 -- 10.10.10.0/24 10.10.10.0/24
RETURN 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_public 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_internal 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5894"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5913:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5913"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5913"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/policy.at:5925:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-source 1234::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5925"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-source 1234::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5925"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi












    { set +x
$as_echo "$at_srcdir/policy.at:5932:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5932"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_public 0 -- 10.10.10.0/24 10.10.10.0/24
RETURN 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_public 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_internal 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5932"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:5951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 1234::/64 ::/0
PRE_public 0 -- 1234::/64 1234::/64
RETURN 0 -- 1234::/64 1234::/64
PRE_public 0 -- 1234::/64 ::/0
RETURN 0 -- 1234::/64 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 1234::/64
PRE_internal 0 -- ::/0 1234::/64
RETURN 0 -- ::/0 1234::/64
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 1234::/64
RETURN 0 -- ::/0 1234::/64
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5951"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/policy.at:5973:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --remove-source 1234::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5973"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --remove-source 1234::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5973"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi











    { set +x
$as_echo "$at_srcdir/policy.at:5999:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:5999"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_public 0 -- 10.10.10.0/24 10.10.10.0/24
RETURN 0 -- 10.10.10.0/24 10.10.10.0/24
PRE_public 0 -- 10.10.10.0/24 0.0.0.0/0
RETURN 0 -- 10.10.10.0/24 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_internal 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_internal 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
PRE_public 0 -- 0.0.0.0/0 10.10.10.0/24
RETURN 0 -- 0.0.0.0/0 10.10.10.0/24
PRE_public 0 -- 0.0.0.0/0 0.0.0.0/0
RETURN 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5999"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:6018:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:6018"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_foobar 0 -- ::/0 ::/0
PRE_internal 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
PRE_allow-host-ipv6 0 -- ::/0 ::/0
PRE_public 0 -- ::/0 ::/0
RETURN 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6018"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:6031:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6031"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6031"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:6047:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:6047"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_internal 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6047"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:6058:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:6058"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
FWD_internal 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6058"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "policy.at:6070" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:6070"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_309
#AT_START_310
at_fn_group_banner 310 'policy.at:6072' \
  "policy - target" "                                " 11
at_xfail=no
(
  $as_echo "310. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:6072: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6072"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6072"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:6072: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:6072"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6072"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:6072: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:6072"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6072"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:6072: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6072"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6072"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:6072" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:6072"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:6072" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:6072"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:6072" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:6072"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:6072" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:6072"








    { set +x
$as_echo "$at_srcdir/policy.at:6075:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6075"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6075"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:6077:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=CONTINUE "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6077"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=CONTINUE
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6077"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6078:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6078"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6078"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6079:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6079"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6079"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6080:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=REJECT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6080"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=REJECT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6080"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6081:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=DENY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6081"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=DENY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/policy.at:6081"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6082:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=default "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6082"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/policy.at:6082"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:6085:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6085"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6085"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6086:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6086"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6086"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6087:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0  "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6087"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6087"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6088:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6088"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6088"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:6089:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6089"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6089"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6089:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6089"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6089"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/policy.at:6102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:6102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_foobar_pre 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_log 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_deny 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_allow 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_post 0 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6102"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:6110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:6110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_foobar_pre 0 -- ::/0 ::/0
IN_foobar_log 0 -- ::/0 ::/0
IN_foobar_deny 0 -- ::/0 ::/0
IN_foobar_allow 0 -- ::/0 ::/0
IN_foobar_post 0 -- ::/0 ::/0
ACCEPT 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6110"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"ignore" != x"ignore"; then
            $as_echo "policy.at:6119" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:6119"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_310
#AT_START_311
at_fn_group_banner 311 'policy.at:6121' \
  "policy - from file" "                             " 11
at_xfail=no
(
  $as_echo "311. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:6121: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6121"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6121"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:6121: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:6121"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6121"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:6121: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:6121"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6121"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:6121: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6121"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6121"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:6121" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:6121"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:6121" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:6121"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:6121" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:6121"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:6121" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:6121"








    { set +x
$as_echo "$at_srcdir/policy.at:6124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6124"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/policy.at:6125: ls \"./policies/allow-host-ipv6.xml\""
at_fn_check_prepare_trace "policy.at:6125"
( $at_check_trace; ls "./policies/allow-host-ipv6.xml"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6125"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/policy.at:6126:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy-from-file \"./policies/allow-host-ipv6.xml\" --name my-allow-host-ipv6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6126"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy-from-file "./policies/allow-host-ipv6.xml" --name my-allow-host-ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6126"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/policy.at:6127: ls \"./policies/my-allow-host-ipv6.xml\""
at_fn_check_prepare_trace "policy.at:6127"
( $at_check_trace; ls "./policies/my-allow-host-ipv6.xml"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6127"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/policy.at:6128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 my-allow-host-ipv6
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6128"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:6131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6131"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6131"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:6132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 my-allow-host-ipv6
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6132"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:6136" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:6136"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_311
#AT_START_312
at_fn_group_banner 312 'policy.at:6138' \
  "policy - zone drifting not allowed" "             " 11
at_xfail=no
(
  $as_echo "312. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:6138: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6138"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6138"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:6138: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:6138"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6138"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:6138: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:6138"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6138"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:6138: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6138"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6138"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:6138" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:6138"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:6138" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:6138"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:6138" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:6138"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:6138" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:6138"








    { set +x
$as_echo "$at_srcdir/policy.at:6141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone external --add-interface dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone external --add-interface dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6141"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-source 10.0.0.0/8 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-source 10.0.0.0/8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6142"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-source 10.10.0.0/16 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-source 10.10.0.0/16
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6143"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6144:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone trusted --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6144"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone trusted --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6144"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:6147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy policy-1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy policy-1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6147"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6148:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy policy-1 --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6148"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy policy-1 --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6148"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy policy-1 --add-ingress-zone trusted "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy policy-1 --add-ingress-zone trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6149"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy policy-1 --add-egress-zone external "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy policy-1 --add-egress-zone external
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6150"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:6152:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy policy-2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6152"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy policy-2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6152"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6153:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy policy-2 --add-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6153"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy policy-2 --add-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6153"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6154:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy policy-2 --add-egress-zone external "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6154"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy policy-2 --add-egress-zone external
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6154"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:6156:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy policy-3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6156"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy policy-3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6156"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6157:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy policy-3 --set-priority 10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6157"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy policy-3 --set-priority 10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6157"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6158:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy policy-3 --add-ingress-zone trusted "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6158"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy policy-3 --add-ingress-zone trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6158"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6159:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy policy-3 --add-egress-zone external "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6159"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy policy-3 --add-egress-zone external
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6159"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:6161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6161"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:6161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:6161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6161"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/policy.at:6229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:6229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_internal 0 -- 10.0.0.0/8 10.0.0.0/8
REJECT 0 -- 10.0.0.0/8 10.0.0.0/8 reject-with icmp-port-unreachable
FWD_internal 0 -- 10.0.0.0/8 10.10.0.0/16
REJECT 0 -- 10.0.0.0/8 10.10.0.0/16 reject-with icmp-port-unreachable
FWD_internal 0 -- 10.0.0.0/8 10.10.10.0/24
REJECT 0 -- 10.0.0.0/8 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_policy-1 0 -- 10.0.0.0/8 0.0.0.0/0
FWD_internal 0 -- 10.0.0.0/8 0.0.0.0/0
REJECT 0 -- 10.0.0.0/8 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_internal 0 -- 10.0.0.0/8 0.0.0.0/0
REJECT 0 -- 10.0.0.0/8 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 10.10.0.0/16 10.0.0.0/8
REJECT 0 -- 10.10.0.0/16 10.0.0.0/8 reject-with icmp-port-unreachable
FWD_public 0 -- 10.10.0.0/16 10.10.0.0/16
REJECT 0 -- 10.10.0.0/16 10.10.0.0/16 reject-with icmp-port-unreachable
FWD_public 0 -- 10.10.0.0/16 10.10.10.0/24
REJECT 0 -- 10.10.0.0/16 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_policy-2 0 -- 10.10.0.0/16 0.0.0.0/0
FWD_public 0 -- 10.10.0.0/16 0.0.0.0/0
REJECT 0 -- 10.10.0.0/16 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 10.10.0.0/16 0.0.0.0/0
REJECT 0 -- 10.10.0.0/16 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_trusted 0 -- 10.10.10.0/24 10.0.0.0/8
ACCEPT 0 -- 10.10.10.0/24 10.0.0.0/8
FWD_trusted 0 -- 10.10.10.0/24 10.10.0.0/16
ACCEPT 0 -- 10.10.10.0/24 10.10.0.0/16
FWD_trusted 0 -- 10.10.10.0/24 10.10.10.0/24
ACCEPT 0 -- 10.10.10.0/24 10.10.10.0/24
FWD_policy-1 0 -- 10.10.10.0/24 0.0.0.0/0
FWD_trusted 0 -- 10.10.10.0/24 0.0.0.0/0
FWD_policy-3 0 -- 10.10.10.0/24 0.0.0.0/0
ACCEPT 0 -- 10.10.10.0/24 0.0.0.0/0
FWD_trusted 0 -- 10.10.10.0/24 0.0.0.0/0
ACCEPT 0 -- 10.10.10.0/24 0.0.0.0/0
FWD_external 0 -- 0.0.0.0/0 10.0.0.0/8
REJECT 0 -- 0.0.0.0/0 10.0.0.0/8 reject-with icmp-port-unreachable
FWD_external 0 -- 0.0.0.0/0 10.10.0.0/16
REJECT 0 -- 0.0.0.0/0 10.10.0.0/16 reject-with icmp-port-unreachable
FWD_external 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_external 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_external 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 10.0.0.0/8
REJECT 0 -- 0.0.0.0/0 10.0.0.0/8 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 10.10.0.0/16
REJECT 0 -- 0.0.0.0/0 10.10.0.0/16 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_policy-2 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6229"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:6286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:6286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_external 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_external 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_policy-2 0 -- ::/0 ::/0
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:6286"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "policy.at:6298" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:6298"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_312
#AT_START_313
at_fn_group_banner 313 'services.at:1' \
  "services" "                                       " 11
at_xfail=no
(
  $as_echo "313. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/services.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/services.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "services.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/services.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "services.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/services.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "services.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/services.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "services.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/services.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "services.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/services.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "services.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/services.at:1"








    { set +x
$as_echo "$at_srcdir/services.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/services.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "services.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT 6 -- 10.10.10.0/24 0.0.0.0/0 tcp dpt:22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/services.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "services.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/services.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:21
ACCEPT 6 -- 10.10.10.0/24 0.0.0.0/0 tcp dpt:21
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:21
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PRE_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PRE_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "CT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 CT helper ftp
CT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 CT helper ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PRE_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PRE_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "CT 6 -- ::/0 ::/0 tcp dpt:21 CT helper ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/services.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-service does-not-exist "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-service does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/services.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-service does-not-exist "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-service does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/services.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-interface raboof0 --add-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-interface raboof0 --add-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/services.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-interface raboof0 --add-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-interface raboof0 --add-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/services.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_SERVICE/d'" != x"ignore"; then
            $as_echo "services.at:97" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_SERVICE/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/services.at:97"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_313
#AT_START_314
at_fn_group_banner 314 'ports.at:1' \
  "ports" "                                          " 11
at_xfail=no
(
  $as_echo "314. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/ports.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/ports.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "ports.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/ports.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "ports.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/ports.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "ports.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/ports.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ports.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ports.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "ports.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/ports.at:1"








    { set +x
$as_echo "$at_srcdir/ports.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ports.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ports.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ports.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/ports.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ports.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1234
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:1234
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:4321
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/ports.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ports.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp dpt:1234
ACCEPT 17 -- ::/0 ::/0 udp dpt:1234
ACCEPT 17 -- ::/0 ::/0 udp dpt:4321
ACCEPT 17 -- ::/0 ::/0 udp dpt:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/ports.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:1234
ACCEPT 132 -- 0.0.0.0/0 0.0.0.0/0 sctp dpt:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 17 -- ::/0 ::/0 udp dpt:1234
ACCEPT 132 -- ::/0 ::/0 sctp dpt:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/ports.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 123443/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-port 123443/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/bogus "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234/bogus "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ports.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=4444 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "ports.at:107" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/ports.at:107"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_314
#AT_START_315
at_fn_group_banner 315 'source_ports.at:1' \
  "source ports" "                                   " 11
at_xfail=no
(
  $as_echo "315. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/source_ports.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/source_ports.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "source_ports.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/source_ports.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "source_ports.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/source_ports.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "source_ports.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/source_ports.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "source_ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/source_ports.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "source_ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/source_ports.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "source_ports.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/source_ports.at:1"








    { set +x
$as_echo "$at_srcdir/source_ports.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/source_ports.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/source_ports.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/source_ports.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/source_ports.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "source_ports.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp spt:1234
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp spt:1234
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp spt:4321
ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp spt:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/source_ports.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "source_ports.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- ::/0 ::/0 tcp spt:1234
ACCEPT 17 -- ::/0 ::/0 udp spt:1234
ACCEPT 17 -- ::/0 ::/0 udp spt:4321
ACCEPT 17 -- ::/0 ::/0 udp spt:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/source_ports.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 17 -- 0.0.0.0/0 0.0.0.0/0 udp spt:1234
ACCEPT 132 -- 0.0.0.0/0 0.0.0.0/0 sctp spt:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 17 -- ::/0 ::/0 udp spt:1234
ACCEPT 132 -- ::/0 ::/0 sctp spt:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/source_ports.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 123443/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 123443/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/bogus "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234/bogus "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/source_ports.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=4444 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "source_ports.at:107" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/source_ports.at:107"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_315
#AT_START_316
at_fn_group_banner 316 'forward_ports.at:1' \
  "forward ports" "                                  " 11
at_xfail=no
(
  $as_echo "316. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/forward_ports.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/forward_ports.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "forward_ports.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/forward_ports.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "forward_ports.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/forward_ports.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "forward_ports.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/forward_ports.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "forward_ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/forward_ports.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "forward_ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/forward_ports.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "forward_ports.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/forward_ports.at:1"








    { set +x
$as_echo "$at_srcdir/forward_ports.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/forward_ports.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/forward_ports.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/forward_ports.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/forward_ports.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/forward_ports.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/forward_ports.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/forward_ports.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PRE_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PRE_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:33 to:10.10.10.10:33
DNAT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:444 to:10.44.44.44:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/forward_ports.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PRE_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PRE_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT 17 -- ::/0 ::/0 udp dpt:44 to:[1234::4321]:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/forward_ports.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/forward_ports.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/forward_ports.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/forward_ports.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/forward_ports.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PRE_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PRE_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:33 to:10.10.10.10:33
DNAT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:444 to:10.44.44.44:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PRE_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PRE_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/forward_ports.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/forward_ports.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/forward_ports.at:128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PRE_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PRE_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 to::2222
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:128"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/forward_ports.at:131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PRE_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PRE_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT 17 -- ::/0 ::/0 udp dpt:444 to::4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:131"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/forward_ports.at:134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:136:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:136"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:136"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:137"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:142"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:144:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:144"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:144"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:145"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:146"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:147"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:149"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:150"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:151:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:151"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:151"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:152:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:152"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:152"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:155:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:155"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:155"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:156:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:156"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:156"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:157:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:157"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:157"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:158:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:158"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:158"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:159:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:159"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:159"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:160:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:160"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:160"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:161"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:162:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:162"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:162"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:163:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:163"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:163"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:164:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:164"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:164"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:165:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:165"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:165"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:169:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:169"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:173"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:175"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:176"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:177:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:177"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:177"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:178:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:178"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:178"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:179:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:179"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:179"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:180:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:180"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:180"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:181:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:181"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:181"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:182:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:182"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:182"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/forward_ports.at:191:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PRE_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:191"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PRE_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 to:10.0.0.1:2222
DNAT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:444 to:10.44.44.44:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:191"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"-e '/ERROR: INVALID_FORWARD/d' -e '/ERROR: INVALID_ZONE/d'" != x"ignore"; then
            $as_echo "forward_ports.at:196" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_FORWARD/d' -e '/ERROR: INVALID_ZONE/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/forward_ports.at:196"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_316
#AT_START_317
at_fn_group_banner 317 'forward_ports.at:199' \
  "forward ports (OUTPUT)" "                         " 11
at_xfail=no
(
  $as_echo "317. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/forward_ports.at:199: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:199"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/forward_ports.at:199: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "forward_ports.at:199"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/forward_ports.at:199: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "forward_ports.at:199"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/forward_ports.at:199: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:199"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "forward_ports.at:199" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/forward_ports.at:199"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "forward_ports.at:199" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/forward_ports.at:199"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "forward_ports.at:199" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/forward_ports.at:199"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "forward_ports.at:199" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/forward_ports.at:199"








    { set +x
$as_echo "$at_srcdir/forward_ports.at:202:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:202"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:202"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:203:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone localhost "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:203"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone localhost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:203"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:204:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:204"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:204"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:204:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:204"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:204"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:209:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:209"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:209"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --add-ingress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --add-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:218:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:218"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:218"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:219:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:219"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:219"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:220:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:220"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:220"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/forward_ports.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L OUT_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L OUT_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 to:10.0.0.1:2222
DNAT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:444 to:10.44.44.44:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/forward_ports.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-ingress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:235"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --remove-ingress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --remove-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:237:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:237"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:237"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:242:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone localhost --add-source 127.0.0.0/8 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:242"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone localhost --add-source 127.0.0.0/8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:244:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone localhost "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:244"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone localhost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:247:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:247"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:247"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:248:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:248"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:248"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --zone localhost --add-source 127.0.0.0/8 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --zone localhost --add-source 127.0.0.0/8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:249"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:250:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --add-ingress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:250"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --add-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:250"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --add-egress-zone localhost "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --add-egress-zone localhost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:251"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/forward_ports.at:264:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L OUT_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:264"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L OUT_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 to:10.0.0.1:2222
DNAT 17 -- 0.0.0.0/0 0.0.0.0/0 udp dpt:444 to:10.44.44.44:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:264"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/forward_ports.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone localhost --remove-source 127.0.0.0/8 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone localhost --remove-source 127.0.0.0/8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-ingress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:271:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-egress-zone localhost "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:271"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-egress-zone localhost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:271"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:272:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --zone localhost --remove-source 127.0.0.0/8 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:272"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --zone localhost --remove-source 127.0.0.0/8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:272"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --remove-ingress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --remove-ingress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --remove-egress-zone localhost "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --remove-egress-zone localhost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:274"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_FORWARD/d' -e '/ERROR: INVALID_ZONE/d'" != x"ignore"; then
            $as_echo "forward_ports.at:276" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_FORWARD/d' -e '/ERROR: INVALID_ZONE/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/forward_ports.at:276"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_317
#AT_START_318
at_fn_group_banner 318 'masquerade.at:1' \
  "masquerade" "                                     " 11
at_xfail=no
(
  $as_echo "318. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/masquerade.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/masquerade.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "masquerade.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/masquerade.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "masquerade.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/masquerade.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "masquerade.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/masquerade.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "masquerade.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/masquerade.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "masquerade.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/masquerade.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "masquerade.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/masquerade.at:1"








    { set +x
$as_echo "$at_srcdir/masquerade.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/masquerade.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POST_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "masquerade.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POST_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MASQUERADE 0 -- 0.0.0.0/0 0.0.0.0/0
MASQUERADE 0 -- 10.10.10.0/24 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/masquerade.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POST_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "masquerade.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POST_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/masquerade.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POST_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POST_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MASQUERADE 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POST_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POST_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MASQUERADE 0 -- 1234::/64 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/masquerade.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar_host "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar_host
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:77:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar_host --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:77"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar_host --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:79:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --remove-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:79"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --remove-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar_int_to_pub "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar_int_to_pub
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar_int_to_pub --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/masquerade.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"-e '/ERROR: INVALID_ZONE:/d'" != x"ignore"; then
            $as_echo "masquerade.at:132" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ZONE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/masquerade.at:132"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_318
#AT_START_319
at_fn_group_banner 319 'protocols.at:1' \
  "protocols" "                                      " 11
at_xfail=no
(
  $as_echo "319. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/protocols.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/protocols.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "protocols.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/protocols.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "protocols.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/protocols.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "protocols.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/protocols.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "protocols.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/protocols.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "protocols.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/protocols.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "protocols.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/protocols.at:1"








    { set +x
$as_echo "$at_srcdir/protocols.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/protocols.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/protocols.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/protocols.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/protocols.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "protocols.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 132 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 58 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 33 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 47 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/protocols.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "protocols.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 132 -- ::/0 ::/0
ACCEPT 58 -- ::/0 ::/0
ACCEPT 33 -- ::/0 ::/0
ACCEPT 47 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/protocols.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 58 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 132 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 58 -- ::/0 ::/0
ACCEPT 132 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/protocols.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-protocol dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-protocol dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule protocol value=\"dummy\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule protocol value="dummy" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule protocol value=\"dummy\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule protocol value="dummy" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_PROTOCOL: dummy/d'" != x"ignore"; then
            $as_echo "protocols.at:98" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_PROTOCOL: dummy/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/protocols.at:98"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_319
#AT_START_320
at_fn_group_banner 320 'rich_rules.at:1' \
  "rich rules" "                                     " 11
at_xfail=no
(
  $as_echo "320. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rich_rules.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rich_rules.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rich_rules.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rich_rules.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rich_rules.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rich_rules.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rich_rules.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rich_rules.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rich_rules.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_rules.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rich_rules.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_rules.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rich_rules.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rich_rules.at:1"








    { set +x
$as_echo "$at_srcdir/rich_rules.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_rules.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_foobar_pre 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_log 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_deny 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_allow 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_post 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rich_rules.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_foobar_pre 0 -- ::/0 ::/0
IN_foobar_log 0 -- ::/0 ::/0
IN_foobar_deny 0 -- ::/0 ::/0
IN_foobar_allow 0 -- ::/0 ::/0
IN_foobar_post 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/rich_rules.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4             source address=10.10.10.10 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4             source address=10.10.10.10 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 log accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 log accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 audit accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.12 reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.12 reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.13 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.13 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.10.10.14 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.10.10.14 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=1  source address=10.10.10.15 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=1  source address=10.10.10.15 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_rules.at:57:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:57"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 10.10.10.14 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:57"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_rules.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_log; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_log; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG 0 -- 10.10.10.11 0.0.0.0/0 LOG flags 0 level 4
AUDIT 0 -- 10.10.10.11 0.0.0.0/0 AUDIT accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_rules.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT 0 -- 10.10.10.12 0.0.0.0/0 reject-with icmp-port-unreachable
DROP 0 -- 10.10.10.13 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_rules.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 10.10.10.10 0.0.0.0/0
ACCEPT 0 -- 10.10.10.11 0.0.0.0/0
ACCEPT 0 -- 10.10.10.11 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_rules.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_post; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_post; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 10.10.10.15 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_rules.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.20.20.20 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.20.20.20 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-2 destination address=10.20.20.21 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-2 destination address=10.20.20.21 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-3 source address=10.20.20.22 destination address=10.20.20.23 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-3 source address=10.20.20.22 destination address=10.20.20.23 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv6 priority=-4 source address=1234::4321 destination address=1234::4444 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv6 priority=-4 source address=1234::4321 destination address=1234::4444 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_rules.at:126:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:126"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP 0 -- 10.20.20.22 10.20.20.23
ACCEPT 0 -- 0.0.0.0/0 10.20.20.21
ACCEPT 0 -- 10.10.10.14 0.0.0.0/0
ACCEPT 0 -- 10.20.20.20 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:126"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rich_rules.at:132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP 0 -- 1234::4321 1234::4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:132"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/rich_rules.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 icmp-type name=\"neighbour-advertisement\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 icmp-type name="neighbour-advertisement" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-2 icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-2 icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_rules.at:155:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:155"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP 0 -- 10.20.20.22 10.20.20.23
ACCEPT 0 -- 0.0.0.0/0 10.20.20.21
ACCEPT 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
ACCEPT 0 -- 10.10.10.14 0.0.0.0/0
ACCEPT 0 -- 10.20.20.20 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:155"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rich_rules.at:162:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:162"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP 0 -- 1234::4321 1234::4444
ACCEPT 58 -- ::/0 ::/0 ipv6-icmptype 128
ACCEPT 58 -- ::/0 ::/0 ipv6-icmptype 136
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:162"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/rich_rules.at:168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:173"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-2 mark set=0x6600/0xFF00' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:175"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:176"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:176"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_rules.at:185:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PRE_foobar_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:185"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PRE_foobar_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK 0 -- 0.0.0.0/0 0.0.0.0/0 MARK xset 0x6600/0xff00
MARK 0 -- 0.0.0.0/0 0.0.0.0/0 MARK set 0x4d2
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:185"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rich_rules.at:189:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PRE_foobar_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:189"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PRE_foobar_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK 0 -- ::/0 ::/0 MARK xset 0x6600/0xff00
MARK 0 -- ::/0 ::/0 MARK set 0x4d2
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:189"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/rich_rules.at:193:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:193"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:193"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:198:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:198"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:198"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:199:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:199"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:199:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:199"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_rules.at:208:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PRE_foobar_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:208"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PRE_foobar_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK 0 -- 0.0.0.0/0 0.0.0.0/0 MARK xset 0x6600/0xff00
MARK 0 -- 0.0.0.0/0 0.0.0.0/0 MARK set 0x4d2
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:208"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rich_rules.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PRE_foobar_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PRE_foobar_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK 0 -- ::/0 ::/0 MARK xset 0x6600/0xff00
MARK 0 -- ::/0 ::/0 MARK set 0x4d2
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/rich_rules.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:221:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:221"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:222:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:222"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:222"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_rules.at:232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PRE_foobar_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PRE_foobar_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK 0 -- 0.0.0.0/0 0.0.0.0/0 MARK xset 0x6600/0xff00
MARK 0 -- 0.0.0.0/0 0.0.0.0/0 MARK set 0x4d2
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:232"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rich_rules.at:236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PRE_foobar_pre; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PRE_foobar_pre; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK 0 -- ::/0 ::/0 MARK xset 0x6600/0xff00
MARK 0 -- ::/0 ::/0 MARK set 0x4d2
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/rich_rules.at:240:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:240"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:240"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:241:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:241"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:241"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:242:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:242"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --zone=public --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --zone=public --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:244:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:244"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:247:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:247"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:247"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/rich_rules.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:257:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --zone=public --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:257"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --zone=public --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:257"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:258:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:258"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:258"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:259:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --add-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:259"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/rich_rules.at:259"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:260:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --zone=public --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:260"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --zone=public --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:260"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:261:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:261"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:261"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:263:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:263"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:263"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32000 log prefix=\"LOG: \" level=\"warning\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32000 log prefix="LOG: " level="warning"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32001 audit accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32001 audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_rules.at:280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_post; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_post; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 10.10.10.15 0.0.0.0/0
LOG 0 -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix \"LOG: \"
AUDIT 0 -- 0.0.0.0/0 0.0.0.0/0 AUDIT accept
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rich_rules.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_post; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_post; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG 0 -- ::/0 ::/0 LOG flags 0 level 4 prefix \"LOG: \"
AUDIT 0 -- ::/0 ::/0 AUDIT accept
ACCEPT 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/rich_rules.at:291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=32000 log prefix=\"LOG: \" level=\"warning\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=32000 log prefix="LOG: " level="warning"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:291"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=32001 audit accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=32001 audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:293"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:293"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rich_rules.at:297:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32000 nflog prefix=\"NFLOG: \" queue-size=10' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:297"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32000 nflog prefix="NFLOG: " queue-size=10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:297"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:298:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32001 audit accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:298"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32001 audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:298"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_rules.at:310:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_post; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:310"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_post; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 10.10.10.15 0.0.0.0/0
NFLOG 0 -- 0.0.0.0/0 0.0.0.0/0 nflog-prefix \"NFLOG: \" nflog-threshold 10
AUDIT 0 -- 0.0.0.0/0 0.0.0.0/0 AUDIT accept
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:310"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rich_rules.at:316:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_post; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:316"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_post; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "NFLOG 0 -- ::/0 ::/0 nflog-prefix \"NFLOG: \" nflog-threshold 10
AUDIT 0 -- ::/0 ::/0 AUDIT accept
ACCEPT 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:316"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"-e '/ERROR: INVALID_ZONE:/d'" != x"ignore"; then
            $as_echo "rich_rules.at:322" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ZONE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rich_rules.at:322"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_320
#AT_START_321
at_fn_group_banner 321 'icmp_blocks.at:1' \
  "ICMP blocks" "                                    " 11
at_xfail=no
(
  $as_echo "321. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "icmp_blocks.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_blocks.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "icmp_blocks.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/icmp_blocks.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "icmp_blocks.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_blocks.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "icmp_blocks.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_blocks.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "icmp_blocks.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_blocks.at:1"








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi














    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 reject-with icmp-host-prohibited
REJECT 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 0 reject-with icmp-host-prohibited
REJECT 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 5 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT 58 -- ::/0 ::/0 ipv6-icmptype 128 reject-with icmp6-adm-prohibited
REJECT 58 -- ::/0 ::/0 ipv6-icmptype 129 reject-with icmp6-adm-prohibited
REJECT 58 -- ::/0 ::/0 ipv6-icmptype 137 reject-with icmp6-adm-prohibited
REJECT 58 -- 1234:5678::/64 ::/0 ipv6-icmptype 137 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi














    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT 1 -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_deny; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_deny; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT 58 -- ::/0 ::/0 ipv6-icmptype 128 reject-with icmp6-adm-prohibited
REJECT 58 -- 1234:5678::/64 ::/0 ipv6-icmptype 137 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-icmp-block dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-icmp-block dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:142"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"dummy\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"dummy\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






        if test x"-e '/ERROR: INVALID_ICMPTYPE:/d'" != x"ignore"; then
            $as_echo "icmp_blocks.at:148" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ICMPTYPE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/icmp_blocks.at:148"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_321
#AT_START_322
at_fn_group_banner 322 'rich_tcp_mss_clamp.at:5' \
  "tcp-mss-clamp" "                                  " 11
at_xfail=no
(
  $as_echo "322. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:5"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:5"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rich_tcp_mss_clamp.at:5" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rich_tcp_mss_clamp.at:5"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rich_tcp_mss_clamp.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_tcp_mss_clamp.at:5"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rich_tcp_mss_clamp.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_tcp_mss_clamp.at:5"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rich_tcp_mss_clamp.at:5" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rich_tcp_mss_clamp.at:5"





{ set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:8: mkdir -p ./zones"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:8"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }


cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp value="536"/>
  </rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp value="pmtu"/>
  </rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp value="thisdoesnotexist"/>
  </rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:44: grep \"WARNING: INVALID_RULE: thisdoesnotexist: rule tcp-mss-clamp value=\"thisdoesnotexist\"
\" ./firewalld.log"
at_fn_check_prepare_notrace 'an embedded newline' "rich_tcp_mss_clamp.at:44"
( $at_check_trace; grep "WARNING: INVALID_RULE: thisdoesnotexist: rule tcp-mss-clamp value="thisdoesnotexist"
" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }



cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp/>
  </rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <rule>
    <tcp-mss-clamp value="None"/>
  </rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }





    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS="${FIREWALL_OFFLINE_CMD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:76: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --zone tcp --add-service http"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --zone tcp --add-service http" "rich_tcp_mss_clamp.at:76"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --zone tcp --add-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:77: cat ./zones/tcp.xml"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:77"
( $at_check_trace; cat ./zones/tcp.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<?xml version=\"1.0\" encoding=\"utf-8\"?>
<zone>
  <service name=\"ssh\"/>
  <service name=\"http\"/>
  <rule>
    <tcp-mss-clamp/>
  </rule>
</zone>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:89: rm ./zones/tcp.xml"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:89"
( $at_check_trace; rm ./zones/tcp.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:94: cat ./zones/public.xml"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:94"
( $at_check_trace; cat ./zones/public.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<?xml version=\"1.0\" encoding=\"utf-8\"?>
<zone>
  <short>Public</short>
  <description>For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.</description>
  <service name=\"ssh\"/>
  <service name=\"dhcpv6-client\"/>
  <rule>
    <tcp-mss-clamp/>
  </rule>
  <forward/>
</zone>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=0' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=0'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:108"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=536' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=536'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=pmtu' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=pmtu'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=0' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=0'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=536' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=536'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=pmtu accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=pmtu accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=pmtu' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=pmtu'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_tcp_mss_clamp.at:131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "TCPMSS 6 -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS set 536
TCPMSS 6 -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:131"
$at_failed && at_fn_log_failure
$at_traceon; }












    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:136:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_tcp_mss_clamp.at:136"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "TCPMSS 6 -- ::/0 ::/0 tcp flags:0x06/0x02 TCPMSS set 536
TCPMSS 6 -- ::/0 ::/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:136"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"ignore" != x"ignore"; then
            $as_echo "rich_tcp_mss_clamp.at:141" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rich_tcp_mss_clamp.at:141"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_322
#AT_START_323
at_fn_group_banner 323 'rich_destination_ipset.at:1' \
  "rich destination ipset" "                         " 11
at_xfail=no
(
  $as_echo "323. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rich_destination_ipset.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rich_destination_ipset.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rich_destination_ipset.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rich_destination_ipset.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rich_destination_ipset.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_destination_ipset.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rich_destination_ipset.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_destination_ipset.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rich_destination_ipset.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rich_destination_ipset.at:1"








    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=mypolicy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=mypolicy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=mypolicy --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=mypolicy --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=mypolicy --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=mypolicy --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_destination_ipset.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 6 -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0 match-set foobar dst
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_mypolicy_allow; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_destination_ipset.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_mypolicy_allow; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0 match-set foobar dst
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination bogus=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination bogus=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_RULE: bad attribute/d'              -e '/ERROR: INVALID_DESTINATION: address and ipset/d'" != x"ignore"; then
            $as_echo "rich_destination_ipset.at:52" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_RULE: bad attribute/d'              -e '/ERROR: INVALID_DESTINATION: address and ipset/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rich_destination_ipset.at:52"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_323
#AT_START_324
at_fn_group_banner 324 'zone.at:1' \
  "zone - target" "                                  " 11
at_xfail=no
(
  $as_echo "324. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/zone.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "zone.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/zone.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "zone.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "zone.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "zone.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "zone.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/zone.at:1"








    { set +x
$as_echo "$at_srcdir/zone.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=default "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%% "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%%
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=CONTINUE "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=CONTINUE
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/zone.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DENY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DENY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/zone.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/zone.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_foobar_pre 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_log 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_deny 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_allow 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_post 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/zone.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/zone.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_foobar_pre 0 -- ::/0 ::/0
IN_foobar_log 0 -- ::/0 ::/0
IN_foobar_deny 0 -- ::/0 ::/0
IN_foobar_allow 0 -- ::/0 ::/0
IN_foobar_post 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/zone.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_foobar 0 -- ::/0 ::/0
ACCEPT 0 -- ::/0 ::/0
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi

















    { set +x
$as_echo "$at_srcdir/zone.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_foobar; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_foobar; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar_pre 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar_log 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar_deny 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar_allow 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar_post 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/zone.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/zone.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_foobar; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_foobar; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar_pre 0 -- ::/0 ::/0
FWD_foobar_log 0 -- ::/0 ::/0
FWD_foobar_deny 0 -- ::/0 ::/0
FWD_foobar_allow 0 -- ::/0 ::/0
FWD_foobar_post 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/zone.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar 0 -- ::/0 ::/0
ACCEPT 0 -- ::/0 ::/0
FWD_foobar 0 -- ::/0 ::/0
ACCEPT 0 -- ::/0 ::/0
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/zone.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=default "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone.at:134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/zone.at:159:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:159"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_foobar_pre 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_log 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_deny 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_allow 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_post 0 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT 1 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:159"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/zone.at:167:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:167"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:167"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/zone.at:175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_foobar_pre 0 -- ::/0 ::/0
IN_foobar_log 0 -- ::/0 ::/0
IN_foobar_deny 0 -- ::/0 ::/0
IN_foobar_allow 0 -- ::/0 ::/0
IN_foobar_post 0 -- ::/0 ::/0
ACCEPT 58 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:175"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/zone.at:183:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:183"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_foobar 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:183"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi

















    { set +x
$as_echo "$at_srcdir/zone.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_foobar; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_foobar; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar_pre 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar_log 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar_deny 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar_allow 0 -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar_post 0 -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/zone.at:224:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:224"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_foobar 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:224"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/zone.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_foobar; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_foobar; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar_pre 0 -- ::/0 ::/0
FWD_foobar_log 0 -- ::/0 ::/0
FWD_foobar_deny 0 -- ::/0 ::/0
FWD_foobar_allow 0 -- ::/0 ::/0
FWD_foobar_post 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/zone.at:241:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:241"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_foobar 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:241"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"ignore" != x"ignore"; then
            $as_echo "zone.at:252" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/zone.at:252"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_324
#AT_START_325
at_fn_group_banner 325 'rpfilter.at:1' \
  "rpfilter" "                                       " 11
at_xfail=no
(
  $as_echo "325. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rpfilter.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rpfilter.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rpfilter.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rpfilter.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rpfilter.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rpfilter.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rpfilter.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rpfilter.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rpfilter.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rpfilter.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rpfilter.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rpfilter.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rpfilter.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rpfilter.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rpfilter.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rpfilter.at:1"






    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :





    else
        :





    fi







    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rpfilter.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rpfilter.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT 58 -- ::/0 ::/0 ipv6-icmptype 134
ACCEPT 58 -- ::/0 ::/0 ipv6-icmptype 135
DROP 0 -- ::/0 ::/0 rpfilter validmark invert
PREROUTING_direct 0 -- ::/0 ::/0
PREROUTING_POLICIES 0 -- ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "rpfilter.at:30" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rpfilter.at:30"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_325
#AT_START_326
at_fn_group_banner 326 'zone_combine.at:1' \
  "zone - combine" "                                 " 11
at_xfail=no
(
  $as_echo "326. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone_combine.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone_combine.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone_combine.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/zone_combine.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_combine.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/zone_combine.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "zone_combine.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_combine.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "zone_combine.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_combine.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "zone_combine.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_combine.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "zone_combine.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/zone_combine.at:1"






{ set +x
$as_echo "$at_srcdir/zone_combine.at:8: mkdir -p ./zones/combined"
at_fn_check_prepare_trace "zone_combine.at:8"
( $at_check_trace; mkdir -p ./zones/combined
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

cat >./zones/combined/zone1.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<service name="ssh" />
</zone>
_ATEOF

cat >./zones/combined/zone2.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<service name="https" />
</zone>
_ATEOF

cat >./zones/combined/zone3.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port port="12345" protocol="tcp" />
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/zone_combine.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_combine.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/zone_combine.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "block combined dmz drop external home internal public trusted work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_combine.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone combined --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone combined --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: https ssh
ports: 12345/tcp
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_combine.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "block combined/zone1 combined/zone2 combined/zone3 dmz drop external home internal public trusted work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_combine.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone combined/zone1 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone combined/zone1 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined/zone1
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_combine.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone combined/zone2 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone combined/zone2 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined/zone2
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: https
ports:
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_combine.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone combined/zone3 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone combined/zone3 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined/zone3
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services:
ports: 12345/tcp
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_combine.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone combined --add-protocol icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone combined --add-protocol icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_combine.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone combined --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone combined --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: https ssh
ports: 12345/tcp
protocols: icmp
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_combine.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone combined/zone2 --add-protocol icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_combine.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone combined/zone2 --add-protocol icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_combine.at:134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone combined/zone1 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone combined/zone1 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined/zone1
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: ssh
ports:
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_combine.at:152:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone combined/zone2 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:152"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone combined/zone2 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined/zone2
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services: https
ports:
protocols: icmp
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:152"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_combine.at:170:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone combined/zone3 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_combine.at:170"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone combined/zone3 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "combined/zone3
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces:
sources:
services:
ports: 12345/tcp
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_combine.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "zone_combine.at:189" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/zone_combine.at:189"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_326
#AT_START_327
at_fn_group_banner 327 'reset_defaults.at:1' \
  "reset defaults" "                                 " 11
at_xfail=no
(
  $as_echo "327. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/reset_defaults.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/reset_defaults.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "reset_defaults.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/reset_defaults.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "reset_defaults.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/reset_defaults.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "reset_defaults.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/reset_defaults.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "reset_defaults.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/reset_defaults.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "reset_defaults.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/reset_defaults.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "reset_defaults.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/reset_defaults.at:1"








    { set +x
$as_echo "$at_srcdir/reset_defaults.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reset-to-defaults "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reset-to-defaults
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/reset_defaults.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reset-to-defaults "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reset-to-defaults
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/reset_defaults.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-service zzzzzzzzzzzz "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-service zzzzzzzzzzzz
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service ftp --add-port 22/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service ftp --add-port 22/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/reset_defaults.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-service zzzzzzzzzzzz "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-service zzzzzzzzzzzz
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper ftp --set-short \"FTP HELPER\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper ftp --set-short "FTP HELPER"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --set-short test_short "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --set-short test_short
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset test-ipset --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset test-ipset --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-icmptype test-icmptype "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-icmptype test-icmptype
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/reset_defaults.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-service zzzzzzzzzzzz "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-service zzzzzzzzzzzz
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper ftp --get-short "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper ftp --get-short
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo >>"$at_stdout"; $as_echo "FTP HELPER
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --get-short "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --get-short
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo >>"$at_stdout"; $as_echo "test_short
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-ipset test-ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-ipset test-ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-icmptype test-icmptype "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-icmptype test-icmptype
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/reset_defaults.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/reset_defaults.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service zzzzzzzzzzzz "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service zzzzzzzzzzzz
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-ipset test-ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-ipset test-ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-icmptype test-icmptype "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-icmptype test-icmptype
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/reset_defaults.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reset-to-defaults "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reset-to-defaults
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/reset_defaults.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-service zzzzzzzzzzzz "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-service zzzzzzzzzzzz
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/reset_defaults.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/reset_defaults.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper ftp --get-short "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper ftp --get-short
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --get-short "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --get-short
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo >>"$at_stdout"; $as_echo "Allow host IPv6
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/reset_defaults.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-ipset test-ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-ipset test-ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 135 $at_status "$at_srcdir/reset_defaults.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-icmptype test-icmptype "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-icmptype test-icmptype
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/reset_defaults.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/reset_defaults.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service zzzzzzzzzzzz "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service zzzzzzzzzzzz
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/reset_defaults.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/reset_defaults.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-ipset test-ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-ipset test-ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 135 $at_status "$at_srcdir/reset_defaults.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/reset_defaults.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-icmptype test-icmptype "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "reset_defaults.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-icmptype test-icmptype
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/reset_defaults.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"ignore" != x"ignore"; then
            $as_echo "reset_defaults.at:51" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/reset_defaults.at:51"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_327
#AT_START_328
at_fn_group_banner 328 'zone_priority.at:1' \
  "zone - priority" "                                " 11
at_xfail=no
(
  $as_echo "328. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$EBTABLES" && export EBTABLES="ebtables"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        ulimit -d $(expr 1024 \* 100)

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone_priority.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone_priority.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone_priority.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/zone_priority.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_priority.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                kill_firewalld() {

    pid=$(cat firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(cat networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/zone_priority.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "zone_priority.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_priority.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "zone_priority.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_priority.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS="${FIREWALLD_ARGS} --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "zone_priority.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_priority.at:1"
    fi
    echo "$!" > firewalld.pid

        WANTED_CODE=""
    up=0
    for I in $(seq 60); do
            env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
        RC=$?
        echo "exit code = ${RC}"
        if test ${RC} -eq ${WANTED_CODE:-0}; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "zone_priority.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/zone_priority.at:1"








    { set +x
$as_echo "$at_srcdir/zone_priority.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_priority.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority -32769 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority -32769
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority -32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority -32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority  32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority  32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority  32767 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority  32767
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority -32769 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority -32769
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority -32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority -32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority  32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority  32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority  32767 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority  32767
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority -32769 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority -32769
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority -32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority -32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority  32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority  32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority  32767 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority  32767
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority 0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority 0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority 0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_priority.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --get-ingress-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --get-ingress-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --set-ingress-priority 0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --set-ingress-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --get-egress-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --get-egress-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --set-egress-priority 0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --set-egress-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_priority.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --set-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --set-ingress-priority -2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --set-ingress-priority -2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --set-egress-priority -3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --set-egress-priority -3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --set-priority 0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --set-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_priority.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority 123 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority 123
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --get-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "123
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority 456 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority 456
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --get-ingress-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --get-ingress-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "456
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority 789 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority 789
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --get-egress-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --get-egress-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "789
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_priority.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority 666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority 666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority 666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority 666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --get-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-1
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_priority.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority -2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-ingress-priority -2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority -3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --set-egress-priority -3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone foobar --get-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone foobar --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/zone_priority.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_priority.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-zone foobar | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_priority.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-zone foobar | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "foobar
target: default
ingress-priority: -2
egress-priority: -3
icmp-block-inversion: no
interfaces:
sources:
services:
ports:
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_priority.at:83:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone zone-1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:83"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone zone-1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-1 --set-priority -30000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-1 --set-priority -30000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:85:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-1 --add-interface dummy-1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:85"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-1 --add-interface dummy-1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone zone-2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone zone-2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-2 --set-priority -10000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-2 --set-priority -10000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-2 --add-interface dummy-2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-2 --add-interface dummy-2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone zone-3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone zone-3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-3 --set-ingress-priority -5000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-3 --set-ingress-priority -5000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-3 --set-egress-priority -2000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-3 --set-egress-priority -2000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-3 --add-interface dummy-3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-3 --add-interface dummy-3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone zone-4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone zone-4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-4 --set-ingress-priority -100 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-4 --set-ingress-priority -100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-4 --set-egress-priority 1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-4 --set-egress-priority 1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-4 --add-interface dummy-4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-4 --add-interface dummy-4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone zone-5 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone zone-5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-5 --set-ingress-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-5 --set-ingress-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-5 --set-egress-priority 100 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-5 --set-egress-priority 100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-5 --add-interface dummy-5 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-5 --add-interface dummy-5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone zone-6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone zone-6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-6 --set-priority 500 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-6 --set-priority 500
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-6 --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-6 --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone zone-7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone zone-7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-7 --set-priority 1000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-7 --set-priority 1000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-7 --add-interface dummy-7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-7 --add-interface dummy-7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone zone-8 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone zone-8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-8 --set-priority 30000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-8 --set-priority 30000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:108"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-8 --add-source 10.0.0.0/8 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-8 --add-source 10.0.0.0/8
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone zone-0andlast "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone zone-0andlast
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-0andlast --set-ingress-priority 0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-0andlast --set-ingress-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-0andlast --set-egress-priority 32000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-0andlast --set-egress-priority 32000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone zone-0andlast --add-interface dummy-9 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone zone-0andlast --add-interface dummy-9
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_priority.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }


















    { set +x
$as_echo "$at_srcdir/zone_priority.at:360:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_priority.at:360"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_zone-1 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_zone-2 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_zone-3 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_zone-4 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_zone-5 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_zone-0andlast 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 10.10.10.0/24 0.0.0.0/0
IN_zone-6 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_zone-7 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 10.0.0.0/8 0.0.0.0/0
IN_zone-8 0 -- 10.0.0.0/8 0.0.0.0/0
REJECT 0 -- 10.0.0.0/8 0.0.0.0/0 reject-with icmp-port-unreachable
IN_allow-host-ipv6 0 -- 0.0.0.0/0 0.0.0.0/0
IN_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:360"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/zone_priority.at:392:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_priority.at:392"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_zone-1 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-1 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-1 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-1 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-1 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-1 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_zone-1 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-1 0 -- 0.0.0.0/0 10.0.0.0/8
REJECT 0 -- 0.0.0.0/0 10.0.0.0/8 reject-with icmp-port-unreachable
FWD_zone-1 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-1 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-2 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-2 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-2 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-2 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-2 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-2 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_zone-2 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-2 0 -- 0.0.0.0/0 10.0.0.0/8
REJECT 0 -- 0.0.0.0/0 10.0.0.0/8 reject-with icmp-port-unreachable
FWD_zone-2 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-2 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-3 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-3 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-3 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-3 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-3 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-3 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_zone-3 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-3 0 -- 0.0.0.0/0 10.0.0.0/8
REJECT 0 -- 0.0.0.0/0 10.0.0.0/8 reject-with icmp-port-unreachable
FWD_zone-3 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-3 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-4 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-4 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-4 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-4 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-4 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-4 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_zone-4 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-4 0 -- 0.0.0.0/0 10.0.0.0/8
REJECT 0 -- 0.0.0.0/0 10.0.0.0/8 reject-with icmp-port-unreachable
FWD_zone-4 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-4 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-5 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-5 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-5 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-5 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-5 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-5 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_zone-5 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-5 0 -- 0.0.0.0/0 10.0.0.0/8
REJECT 0 -- 0.0.0.0/0 10.0.0.0/8 reject-with icmp-port-unreachable
FWD_zone-5 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-5 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-0andlast 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-0andlast 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-0andlast 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-0andlast 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-0andlast 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-0andlast 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_zone-0andlast 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-0andlast 0 -- 0.0.0.0/0 10.0.0.0/8
REJECT 0 -- 0.0.0.0/0 10.0.0.0/8 reject-with icmp-port-unreachable
FWD_zone-0andlast 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-0andlast 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-6 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-6 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-6 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-6 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-6 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-6 0 -- 10.10.10.0/24 10.10.10.0/24
REJECT 0 -- 10.10.10.0/24 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_zone-6 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-6 0 -- 10.10.10.0/24 10.0.0.0/8
REJECT 0 -- 10.10.10.0/24 10.0.0.0/8 reject-with icmp-port-unreachable
FWD_zone-6 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-6 0 -- 10.10.10.0/24 0.0.0.0/0
REJECT 0 -- 10.10.10.0/24 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-7 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-7 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-7 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-7 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-7 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-7 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_zone-7 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-7 0 -- 0.0.0.0/0 10.0.0.0/8
REJECT 0 -- 0.0.0.0/0 10.0.0.0/8 reject-with icmp-port-unreachable
FWD_zone-7 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-7 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-8 0 -- 10.0.0.0/8 0.0.0.0/0
REJECT 0 -- 10.0.0.0/8 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-8 0 -- 10.0.0.0/8 0.0.0.0/0
REJECT 0 -- 10.0.0.0/8 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-8 0 -- 10.0.0.0/8 0.0.0.0/0
REJECT 0 -- 10.0.0.0/8 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-8 0 -- 10.0.0.0/8 0.0.0.0/0
REJECT 0 -- 10.0.0.0/8 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-8 0 -- 10.0.0.0/8 0.0.0.0/0
REJECT 0 -- 10.0.0.0/8 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-8 0 -- 10.0.0.0/8 10.10.10.0/24
REJECT 0 -- 10.0.0.0/8 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_zone-8 0 -- 10.0.0.0/8 0.0.0.0/0
REJECT 0 -- 10.0.0.0/8 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-8 0 -- 10.0.0.0/8 10.0.0.0/8
REJECT 0 -- 10.0.0.0/8 10.0.0.0/8 reject-with icmp-port-unreachable
FWD_zone-8 0 -- 10.0.0.0/8 0.0.0.0/0
REJECT 0 -- 10.0.0.0/8 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_zone-8 0 -- 10.0.0.0/8 0.0.0.0/0
REJECT 0 -- 10.0.0.0/8 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 10.10.10.0/24
REJECT 0 -- 0.0.0.0/0 10.10.10.0/24 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 10.0.0.0/8
REJECT 0 -- 0.0.0.0/0 10.0.0.0/8 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
FWD_public 0 -- 0.0.0.0/0 0.0.0.0/0
REJECT 0 -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:392"
$at_failed && at_fn_log_failure
$at_traceon; }












    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/zone_priority.at:595:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_priority.at:595"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_zone-1 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_zone-2 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_zone-3 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_zone-4 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_zone-5 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_zone-0andlast 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_zone-7 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
IN_allow-host-ipv6 0 -- ::/0 ::/0
IN_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:595"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/zone_priority.at:621:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo \$? >&3; } |         sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\\([ -]\\)/ icmpv6\\1/g'                         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]all/\\1 0/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]tcp/\\1 6/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]udp/\\1 17/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmpv6/\\1 58 /g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]icmp/\\1 1/g'         -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]sctp/\\1 132/g'                     -e 's/^\\([-a-zA-Z0-9_]\\+\\)[ ]\\([^ ]*\\)[ ][-]\\?[-]\\?[ ]\\?/\\1 \\2 -- /g'   >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_priority.at:621"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES; echo $? >&3; } |         sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3 |             sed -e 's/[ ]ipv6-icmp\([ -]\)/ icmpv6\1/g'                         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]all/\1 0/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]tcp/\1 6/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]udp/\1 17/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmpv6/\1 58 /g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]icmp/\1 1/g'         -e 's/^\([-a-zA-Z0-9_]\+\)[ ]sctp/\1 132/g'                     -e 's/^\([-a-zA-Z0-9_]\+\)[ ]\([^ ]*\)[ ][-]\?[-]\?[ ]\?/\1 \2 -- /g'   >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_zone-1 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-1 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-1 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-1 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-1 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-1 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-1 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-1 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-2 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-2 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-2 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-2 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-2 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-2 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-2 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-2 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-3 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-3 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-3 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-3 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-3 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-3 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-3 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-3 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-4 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-4 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-4 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-4 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-4 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-4 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-4 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-4 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-5 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-5 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-5 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-5 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-5 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-5 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-5 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-5 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-0andlast 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-0andlast 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-0andlast 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-0andlast 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-0andlast 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-0andlast 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-0andlast 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-0andlast 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-7 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-7 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-7 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-7 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-7 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-7 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-7 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_zone-7 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
FWD_public 0 -- ::/0 ::/0
REJECT 0 -- ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:621"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/zone_priority.at:753:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-zone zone-2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_priority.at:753"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-zone zone-2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "zone-2 (active)
target: default
ingress-priority: -10000
egress-priority: -10000
icmp-block-inversion: no
interfaces: dummy-2
sources:
services:
ports:
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:753"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:771:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-zone zone-4 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_priority.at:771"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-zone zone-4 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "zone-4 (active)
target: default
ingress-priority: -100
egress-priority: 1
icmp-block-inversion: no
interfaces: dummy-4
sources:
services:
ports:
protocols:
forward: no
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:771"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/zone_priority.at:791: cat ./zones/zone-5.xml"
at_fn_check_prepare_trace "zone_priority.at:791"
( $at_check_trace; cat ./zones/zone-5.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<?xml version=\"1.0\" encoding=\"utf-8\"?>
<zone ingress-priority=\"-1\" egress-priority=\"100\">
  <interface name=\"dummy-5\"/>
</zone>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_priority.at:791"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/zone_priority.at:799:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --set-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:799"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:799"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:800:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --set-ingress-priority -2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:800"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --set-ingress-priority -2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:800"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:801:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --set-egress-priority -3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:801"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --set-egress-priority -3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:801"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:802:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --get-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:802"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:802"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:803:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --get-ingress-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:803"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --get-ingress-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:803"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_priority.at:804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --get-egress-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_priority.at:804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --get-egress-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/zone_priority.at:804"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"ignore" != x"ignore"; then
            $as_echo "zone_priority.at:806" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/zone_priority.at:806"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_328
